General
-
Target
harder hit shotgun (Aim assist KBM).bat
-
Size
481KB
-
Sample
250118-1vdrbawlcz
-
MD5
260fc94222cea4e44b95021125336059
-
SHA1
382efde1837e2fe2a73c6542609ea072da99663c
-
SHA256
b5ce0c67ad36e1ec6375ad00f7cc90f337ee6ef116594e01a477346496ece01c
-
SHA512
92b9396aaa8a42b21100303d55352d7a90a9f00bca0829e330b7a1fbaa44d6978eeaa97b67c7a6710793400dcc4e64281a88d57abe28d69e0fb488fa66ce224d
-
SSDEEP
12288:iLDnABmbmfRNwFlBbvR0D9Gs5N9m2umz0p9n:sDABmbcsFnbvRKlPxumz0pR
Static task
static1
Behavioral task
behavioral1
Sample
harder hit shotgun (Aim assist KBM).bat
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
forward-floppy.gl.at.ply.gg:13601
-
Install_directory
%AppData%
-
install_file
SubDir.exe
Targets
-
-
Target
harder hit shotgun (Aim assist KBM).bat
-
Size
481KB
-
MD5
260fc94222cea4e44b95021125336059
-
SHA1
382efde1837e2fe2a73c6542609ea072da99663c
-
SHA256
b5ce0c67ad36e1ec6375ad00f7cc90f337ee6ef116594e01a477346496ece01c
-
SHA512
92b9396aaa8a42b21100303d55352d7a90a9f00bca0829e330b7a1fbaa44d6978eeaa97b67c7a6710793400dcc4e64281a88d57abe28d69e0fb488fa66ce224d
-
SSDEEP
12288:iLDnABmbmfRNwFlBbvR0D9Gs5N9m2umz0p9n:sDABmbcsFnbvRKlPxumz0pR
-
Detect Xworm Payload
-
Modifies firewall policy service
-
Xworm family
-
Blocklisted process makes network request
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
1Clear Windows Event Logs
1Modify Registry
5