Resubmissions

22-01-2025 17:14

250122-vr467sxmfl 10

22-01-2025 16:26

250122-txjl1swkhk 10

General

  • Target

    Aq.cmd

  • Size

    58KB

  • Sample

    250122-vr467sxmfl

  • MD5

    74bc243ae7a708ff855d909cd335015e

  • SHA1

    1ae8eaa354fb74477eff655768044fbe4c70061e

  • SHA256

    c1154d35742a0359eb645c7b5db4590096de42bfaee33701ed17758bed0ce8e7

  • SHA512

    8c73551601b6683cb417678b6f9306333c7f7ab87ec38a3a2b6e16399e9ea58dd6e21b8de28dfb215bd3d64669095a1fdc3af40ab45963f7824fc434f91b75e1

  • SSDEEP

    1536:1eh4s4QPbdRsdhz/IbHYfcOeHJ6xuOyQnQua:kxRsHUbHocBUuOJnNa

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %LocalAppData%

Targets

    • Target

      Aq.cmd

    • Size

      58KB

    • MD5

      74bc243ae7a708ff855d909cd335015e

    • SHA1

      1ae8eaa354fb74477eff655768044fbe4c70061e

    • SHA256

      c1154d35742a0359eb645c7b5db4590096de42bfaee33701ed17758bed0ce8e7

    • SHA512

      8c73551601b6683cb417678b6f9306333c7f7ab87ec38a3a2b6e16399e9ea58dd6e21b8de28dfb215bd3d64669095a1fdc3af40ab45963f7824fc434f91b75e1

    • SSDEEP

      1536:1eh4s4QPbdRsdhz/IbHYfcOeHJ6xuOyQnQua:kxRsHUbHocBUuOJnNa

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks