General

  • Target

    Multitool_Paidv5.23Beta1.bat

  • Size

    412KB

  • Sample

    250122-2p5taazkcx

  • MD5

    7368d3f048408cf28d46f2a477409d75

  • SHA1

    1c80c043336848a4bee416f07e8abfba16a14c81

  • SHA256

    28e5db3fb5cacfc2bfc48068c4a993df4a865d36bbceb0b00f4b1977c790a72d

  • SHA512

    bd2e0146ab223378064ad490c0d97ef2f74d6a10c37fa0a821c8f9c3772e95af8a064e946c06d4ea39b88612d9031b8197a32da4365f6d52d03f63d3ee20b7b8

  • SSDEEP

    6144:aOYca+2SuJ8jGYkHdkmuB+uJeCrOkB/MP3ZTcq2dUcvu5kUGh65pQ/uhwotMZ8dI:aOZuWjGBHufJeC1mPJTeRYIh5/uaot3q

Malware Config

Extracted

Family

xworm

C2

story-earthquake.gl.at.ply.gg:25818

Attributes
  • Install_directory

    %AppData%

  • install_file

    scvhost.exe

Targets

    • Target

      Multitool_Paidv5.23Beta1.bat

    • Size

      412KB

    • MD5

      7368d3f048408cf28d46f2a477409d75

    • SHA1

      1c80c043336848a4bee416f07e8abfba16a14c81

    • SHA256

      28e5db3fb5cacfc2bfc48068c4a993df4a865d36bbceb0b00f4b1977c790a72d

    • SHA512

      bd2e0146ab223378064ad490c0d97ef2f74d6a10c37fa0a821c8f9c3772e95af8a064e946c06d4ea39b88612d9031b8197a32da4365f6d52d03f63d3ee20b7b8

    • SSDEEP

      6144:aOYca+2SuJ8jGYkHdkmuB+uJeCrOkB/MP3ZTcq2dUcvu5kUGh65pQ/uhwotMZ8dI:aOZuWjGBHufJeC1mPJTeRYIh5/uaot3q

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks