General
-
Target
main.cmd
-
Size
140B
-
Sample
250122-gx2rdaskfs
-
MD5
6048bdda1dfd48e6a362ab0215f5e568
-
SHA1
e49d8e37a5eff5fd81584bca4d2184a2a9716b67
-
SHA256
280dcd871598f7ac18dba9d481761b75a46ea1603ffcc221382a512399daa416
-
SHA512
d56ea7dc7c6b1931cd15248e034906b4187c07ea5114699b0be98e85c7f008a40a1754aa17fb0cfd1e939c04357ee37ea8d6f8f4ecd6d2b3996ef7fb3a93bcff
Static task
static1
Behavioral task
behavioral1
Sample
main.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.cmd
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://raw.githubusercontent.com/43a1723/test/refs/heads/main/Mewing
Extracted
https://raw.githubusercontent.com/43a1723/test/refs/heads/main/shellcode/loaderclient.ps1
Extracted
xworm
-
install_file
client.exe
Targets
-
-
Target
main.cmd
-
Size
140B
-
MD5
6048bdda1dfd48e6a362ab0215f5e568
-
SHA1
e49d8e37a5eff5fd81584bca4d2184a2a9716b67
-
SHA256
280dcd871598f7ac18dba9d481761b75a46ea1603ffcc221382a512399daa416
-
SHA512
d56ea7dc7c6b1931cd15248e034906b4187c07ea5114699b0be98e85c7f008a40a1754aa17fb0cfd1e939c04357ee37ea8d6f8f4ecd6d2b3996ef7fb3a93bcff
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3