General

  • Target

    WizClient.bat

  • Size

    290KB

  • Sample

    250123-wvbjqsykaw

  • MD5

    c1ada68397edbfcfba65bbf74825dbb7

  • SHA1

    598e36b553dce2162da5538afd6963305867ddfd

  • SHA256

    17461bf6850bc3f35d4e62863ea84fa3aefad272dc215330253a2db22fc4fbe6

  • SHA512

    8e3f8d00ebe8144aa7368750e98a78dc7fcd265ec96b7e1abac7138f88175436ffda1406c32ea01389527b1cb31e21c65fe1c3ec2292ad1bde24f571fdec3ff4

  • SSDEEP

    6144:NDwMv3CaJlSc57GWXUeA5XGU8DM93x/HbiJC9h1WtDcquSB7Cq:NvCIbYilABEI93VHbic9PW5rVB7Cq

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %ProgramData%

Targets

    • Target

      WizClient.bat

    • Size

      290KB

    • MD5

      c1ada68397edbfcfba65bbf74825dbb7

    • SHA1

      598e36b553dce2162da5538afd6963305867ddfd

    • SHA256

      17461bf6850bc3f35d4e62863ea84fa3aefad272dc215330253a2db22fc4fbe6

    • SHA512

      8e3f8d00ebe8144aa7368750e98a78dc7fcd265ec96b7e1abac7138f88175436ffda1406c32ea01389527b1cb31e21c65fe1c3ec2292ad1bde24f571fdec3ff4

    • SSDEEP

      6144:NDwMv3CaJlSc57GWXUeA5XGU8DM93x/HbiJC9h1WtDcquSB7Cq:NvCIbYilABEI93VHbic9PW5rVB7Cq

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks