General
-
Target
TrustThis.bat
-
Size
399KB
-
Sample
241208-t6rnzstpdp
-
MD5
85b6801e12b0ee43cf2560af4de44ce5
-
SHA1
243e69b236417be977c73eadfbdfd55325e125b7
-
SHA256
9925507f83ab80df2cd03ad5ffd66571adc3eaf60c6bf136240e58ff29e13893
-
SHA512
4d792f91e03b70833b51054053a61fabcb11bfb22eb8d47cb19a5268c9633dd50443557b41a56b8ad18def99ab0b1b8e00a3533fec0e89ff668bd4c3ea28b944
-
SSDEEP
6144:pKLt2bMn672f3rrEQW7064pE67o8kYJ9b+OLDG7hg+2Xr2mpB3bcJ4VLuAFsdrTi:pKCMqW3ZW7nPY3b+G4gI0jVLmVi
Static task
static1
Behavioral task
behavioral1
Sample
TrustThis.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TrustThis.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
paris-itself.gl.at.ply.gg:49485
-
Install_directory
%Public%
-
install_file
USB.exe
Targets
-
-
Target
TrustThis.bat
-
Size
399KB
-
MD5
85b6801e12b0ee43cf2560af4de44ce5
-
SHA1
243e69b236417be977c73eadfbdfd55325e125b7
-
SHA256
9925507f83ab80df2cd03ad5ffd66571adc3eaf60c6bf136240e58ff29e13893
-
SHA512
4d792f91e03b70833b51054053a61fabcb11bfb22eb8d47cb19a5268c9633dd50443557b41a56b8ad18def99ab0b1b8e00a3533fec0e89ff668bd4c3ea28b944
-
SSDEEP
6144:pKLt2bMn672f3rrEQW7064pE67o8kYJ9b+OLDG7hg+2Xr2mpB3bcJ4VLuAFsdrTi:pKCMqW3ZW7nPY3b+G4gI0jVLmVi
-
Detect Xworm Payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1