General

  • Target

    EzSpoofer.bat

  • Size

    291KB

  • Sample

    250124-rzgjbssray

  • MD5

    9524fa679cf2b883fddf8dfe3f0c2c4f

  • SHA1

    2b20ad331b377685226e8e40d5c7364d102f0735

  • SHA256

    577c05e3a4882a69fe2a06ac772ee8742bb54c9a098a34ccdcd00da7815adc30

  • SHA512

    a38743fe6c3bf55dab74b5c04f785345a420ed23c1513ce0901f1f78e28f277c8c49cad809c909a2bb0cb9e16d98ce88dd92a241e11f4ab4e128728077b3c42d

  • SSDEEP

    6144:yUkjDHOfsQkBWTAaCi+oG7RZAkehxo4CzC1a5TAl2K9:yvPuE3BIQTEjPv5

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %ProgramData%

Targets

    • Target

      EzSpoofer.bat

    • Size

      291KB

    • MD5

      9524fa679cf2b883fddf8dfe3f0c2c4f

    • SHA1

      2b20ad331b377685226e8e40d5c7364d102f0735

    • SHA256

      577c05e3a4882a69fe2a06ac772ee8742bb54c9a098a34ccdcd00da7815adc30

    • SHA512

      a38743fe6c3bf55dab74b5c04f785345a420ed23c1513ce0901f1f78e28f277c8c49cad809c909a2bb0cb9e16d98ce88dd92a241e11f4ab4e128728077b3c42d

    • SSDEEP

      6144:yUkjDHOfsQkBWTAaCi+oG7RZAkehxo4CzC1a5TAl2K9:yvPuE3BIQTEjPv5

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks