General

  • Target

    SpooferFornite.bat

  • Size

    289KB

  • Sample

    250123-xbfvsaypa1

  • MD5

    1776b4ed272a4c874cb62d3827da9330

  • SHA1

    15611ee351e8fdb75b6d65fb5a2e111c3fed6b2e

  • SHA256

    9b4083ac2dee0d90ca305780b1318931af119cccd8e9516dd443f3a5ff3e0af7

  • SHA512

    e498841716e88b7ad28b53d33e4a448361abab540642171f9a8fc07f6f4e097d9aff20f4489c2ad49a76b0b94f27cc57a234022fe1c75174af641c72151d613e

  • SSDEEP

    6144:TO/Pb0ZIWr3AuGHdOOJvpW2hZkewDbShSj2+AoACcSc2hJaDeAnul2xojol9r:TO/bTNHdxW2rkewDbc8cH/x4o3r

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %ProgramData%

Targets

    • Target

      SpooferFornite.bat

    • Size

      289KB

    • MD5

      1776b4ed272a4c874cb62d3827da9330

    • SHA1

      15611ee351e8fdb75b6d65fb5a2e111c3fed6b2e

    • SHA256

      9b4083ac2dee0d90ca305780b1318931af119cccd8e9516dd443f3a5ff3e0af7

    • SHA512

      e498841716e88b7ad28b53d33e4a448361abab540642171f9a8fc07f6f4e097d9aff20f4489c2ad49a76b0b94f27cc57a234022fe1c75174af641c72151d613e

    • SSDEEP

      6144:TO/Pb0ZIWr3AuGHdOOJvpW2hZkewDbShSj2+AoACcSc2hJaDeAnul2xojol9r:TO/bTNHdxW2rkewDbc8cH/x4o3r

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks