General
-
Target
$phantomClient.bat
-
Size
278KB
-
Sample
250121-2m9pfsvphp
-
MD5
c7f70f6597b99690acab02390af9a913
-
SHA1
ec989e5b37d4d9bf56d9b330ed97826313ae3255
-
SHA256
f07d66adf106785f59920963b5c928dfd5a16774ab476f262135bc3c2cd58590
-
SHA512
991f4c36731dea73455da9a81185af01fb54cda915b5632edbc3f2251648745e47fd09b21d6548dcae170b1bfcf470b89f311cefc6733013be23667b31ae036b
-
SSDEEP
6144:3LDqmpofOLfpSCTvwLEbxm1/zGfAaWK6NY8M2PZaNSRw4ia:bDqmpofOLfh73KqltvChaivL
Static task
static1
Behavioral task
behavioral1
Sample
$phantomClient.bat
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
5.0
real-enquiry.gl.at.ply.gg:15403
Twor9QJPgxqGUGz9
-
Install_directory
%Public%
-
install_file
USB.exe
Targets
-
-
Target
$phantomClient.bat
-
Size
278KB
-
MD5
c7f70f6597b99690acab02390af9a913
-
SHA1
ec989e5b37d4d9bf56d9b330ed97826313ae3255
-
SHA256
f07d66adf106785f59920963b5c928dfd5a16774ab476f262135bc3c2cd58590
-
SHA512
991f4c36731dea73455da9a81185af01fb54cda915b5632edbc3f2251648745e47fd09b21d6548dcae170b1bfcf470b89f311cefc6733013be23667b31ae036b
-
SSDEEP
6144:3LDqmpofOLfpSCTvwLEbxm1/zGfAaWK6NY8M2PZaNSRw4ia:bDqmpofOLfh73KqltvChaivL
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-