General

  • Target

    skibidi toilet.bat

  • Size

    405KB

  • Sample

    241202-c2hf3svmhy

  • MD5

    5c9e99bce6940302fcd272f3f2ee4fbb

  • SHA1

    b09e0e78ce4af3c4e0ef0e769ecb3417188d3f55

  • SHA256

    60ddaf8d345c4fab6658466b51ceb48e63bf3d04fb76353ed18e42c069138ad7

  • SHA512

    34e4e588497e886daf4531ef98702285a65e80a4b79752c9ca9eb57cf342ad19e594b1f579f197e8320c9a5a84f0888b053a1a4c01907e3ffd6688ab06bd9586

  • SSDEEP

    6144:+z0aix6BLxnTI513uNOp/OOUkzGYvZBrRAIOP85qEon6CKjQHdm7mpktiPrcr9pK:ixlE51esp/DdZkI68VUPKcHUikwi9pK

Malware Config

Extracted

Family

xworm

C2

194.59.30.229:7000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      skibidi toilet.bat

    • Size

      405KB

    • MD5

      5c9e99bce6940302fcd272f3f2ee4fbb

    • SHA1

      b09e0e78ce4af3c4e0ef0e769ecb3417188d3f55

    • SHA256

      60ddaf8d345c4fab6658466b51ceb48e63bf3d04fb76353ed18e42c069138ad7

    • SHA512

      34e4e588497e886daf4531ef98702285a65e80a4b79752c9ca9eb57cf342ad19e594b1f579f197e8320c9a5a84f0888b053a1a4c01907e3ffd6688ab06bd9586

    • SSDEEP

      6144:+z0aix6BLxnTI513uNOp/OOUkzGYvZBrRAIOP85qEon6CKjQHdm7mpktiPrcr9pK:ixlE51esp/DdZkI68VUPKcHUikwi9pK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks