General
-
Target
EzSpoofer.bat
-
Size
291KB
-
Sample
250124-rzgjbssray
-
MD5
9524fa679cf2b883fddf8dfe3f0c2c4f
-
SHA1
2b20ad331b377685226e8e40d5c7364d102f0735
-
SHA256
577c05e3a4882a69fe2a06ac772ee8742bb54c9a098a34ccdcd00da7815adc30
-
SHA512
a38743fe6c3bf55dab74b5c04f785345a420ed23c1513ce0901f1f78e28f277c8c49cad809c909a2bb0cb9e16d98ce88dd92a241e11f4ab4e128728077b3c42d
-
SSDEEP
6144:yUkjDHOfsQkBWTAaCi+oG7RZAkehxo4CzC1a5TAl2K9:yvPuE3BIQTEjPv5
Static task
static1
Behavioral task
behavioral1
Sample
EzSpoofer.bat
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%ProgramData%
Targets
-
-
Target
EzSpoofer.bat
-
Size
291KB
-
MD5
9524fa679cf2b883fddf8dfe3f0c2c4f
-
SHA1
2b20ad331b377685226e8e40d5c7364d102f0735
-
SHA256
577c05e3a4882a69fe2a06ac772ee8742bb54c9a098a34ccdcd00da7815adc30
-
SHA512
a38743fe6c3bf55dab74b5c04f785345a420ed23c1513ce0901f1f78e28f277c8c49cad809c909a2bb0cb9e16d98ce88dd92a241e11f4ab4e128728077b3c42d
-
SSDEEP
6144:yUkjDHOfsQkBWTAaCi+oG7RZAkehxo4CzC1a5TAl2K9:yvPuE3BIQTEjPv5
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1