General

  • Target

    EzzSpoofer.bat

  • Size

    291KB

  • Sample

    250124-rz4c4avldp

  • MD5

    93ed121ccdb1d03be4f5fa2013de563d

  • SHA1

    d727b44d67723f8d2ee886b727d1b49c0b61d88c

  • SHA256

    fb3ede897d32b7d8a9b16fa2fb1ee1648fceb49bc253f65984708c58f6454bcd

  • SHA512

    0efa1904eef1a0b9ac925b9ef5b5255d37aff31b7f047f038ec780069b5042e1cf17f5fbb3ada53cee2e056eeb085932292d4859bc02b5f89a32b810e200373a

  • SSDEEP

    6144:4yWQ3Hb62YBTYYzGeYSXl7TuvwX/oSmp1FBNh:4o6zTN6efzYFTh

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %ProgramData%

Targets

    • Target

      EzzSpoofer.bat

    • Size

      291KB

    • MD5

      93ed121ccdb1d03be4f5fa2013de563d

    • SHA1

      d727b44d67723f8d2ee886b727d1b49c0b61d88c

    • SHA256

      fb3ede897d32b7d8a9b16fa2fb1ee1648fceb49bc253f65984708c58f6454bcd

    • SHA512

      0efa1904eef1a0b9ac925b9ef5b5255d37aff31b7f047f038ec780069b5042e1cf17f5fbb3ada53cee2e056eeb085932292d4859bc02b5f89a32b810e200373a

    • SSDEEP

      6144:4yWQ3Hb62YBTYYzGeYSXl7TuvwX/oSmp1FBNh:4o6zTN6efzYFTh

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables Task Manager via registry modification

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks