General

  • Target

    xwom.bat

  • Size

    289KB

  • Sample

    250119-e3fpzsvrdt

  • MD5

    70f8d974c2a88306feb001f1fa941742

  • SHA1

    9af58f49b85b9b0cec9a9aa7341619be9816e11c

  • SHA256

    9474ce66db13f8709d90b965efc25787858533d44f7b2d6aae51939350547748

  • SHA512

    f0e4a5b4fb451f69b1e7bd5171ed8274d27e96f66927ff7ac9761176452e48884daa64cee526570bd07f1034e2cc982713e441f3bc2c3d9a419ddde5b58d8ede

  • SSDEEP

    6144:20eM6eHlpD0EUulZTKIeiUBMQrr3NE4E8/OUW4ncFOBr0iVU:20eMnldZTKIeAh4YUF90x

Malware Config

Extracted

Family

xworm

C2

109.176.252.16:80

109.176.252.16:80:80

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    WinReg32.exe

Targets

    • Target

      xwom.bat

    • Size

      289KB

    • MD5

      70f8d974c2a88306feb001f1fa941742

    • SHA1

      9af58f49b85b9b0cec9a9aa7341619be9816e11c

    • SHA256

      9474ce66db13f8709d90b965efc25787858533d44f7b2d6aae51939350547748

    • SHA512

      f0e4a5b4fb451f69b1e7bd5171ed8274d27e96f66927ff7ac9761176452e48884daa64cee526570bd07f1034e2cc982713e441f3bc2c3d9a419ddde5b58d8ede

    • SSDEEP

      6144:20eM6eHlpD0EUulZTKIeiUBMQrr3NE4E8/OUW4ncFOBr0iVU:20eMnldZTKIeAh4YUF90x

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks