General
-
Target
JoresSpoofer.bat
-
Size
288KB
-
Sample
250123-xqabjszkcw
-
MD5
0d54ebc1a6e4ebe7d65b969c4024ed1e
-
SHA1
d790848a4fb6566f261336c792d3dc52231b6893
-
SHA256
3e9360777427b09db15faafc2cd5171b403461b445a932ee5e88d55b8342f876
-
SHA512
8ac84b09ba0f134a0575940877a2bea840c313ac2cdc048ffa2e1f64e9ea50aa59fe741f5b44ec1731ea4df7f17dd0a8f71c92ae305fc65893b81196e9293580
-
SSDEEP
6144:eAxGUqNRfHDHpulKyACuprcyfVsG3GNvMr+MjICSjQp:eAxRIf1W6CupwyfSueBK
Static task
static1
Behavioral task
behavioral1
Sample
JoresSpoofer.bat
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%ProgramData%
Targets
-
-
Target
JoresSpoofer.bat
-
Size
288KB
-
MD5
0d54ebc1a6e4ebe7d65b969c4024ed1e
-
SHA1
d790848a4fb6566f261336c792d3dc52231b6893
-
SHA256
3e9360777427b09db15faafc2cd5171b403461b445a932ee5e88d55b8342f876
-
SHA512
8ac84b09ba0f134a0575940877a2bea840c313ac2cdc048ffa2e1f64e9ea50aa59fe741f5b44ec1731ea4df7f17dd0a8f71c92ae305fc65893b81196e9293580
-
SSDEEP
6144:eAxGUqNRfHDHpulKyACuprcyfVsG3GNvMr+MjICSjQp:eAxRIf1W6CupwyfSueBK
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1