General
-
Target
EspooferFixed.bat
-
Size
265KB
-
Sample
250124-sdsj5svrgk
-
MD5
b305aa4a553e75efdef58b62ab9a1363
-
SHA1
14b80df7c7cd154275564d8678a99e99096bcbe4
-
SHA256
3af55470fb8f6549631c51af8fb360e144b3a2213328251fb5c893afefd39b2a
-
SHA512
ba37b738e73e85d8b4d5ec186c2469d533b94692f00ad07931287fed3bf3c7c9b17ed52f6e9289eb846ebfad25009d6ff1486880d91c45b63be96f276b45ba8f
-
SSDEEP
6144:qo5yDFBOGJBGmR9BJTGPbL5aFPB9Wxo8W2823a8kyXQ5iDoaPz73HyXMft6E:HgFt7hR9BJSPP5yBUxosXQ5koab73Hy2
Static task
static1
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
GgTsuAV3pXf6aU6z
Targets
-
-
Target
EspooferFixed.bat
-
Size
265KB
-
MD5
b305aa4a553e75efdef58b62ab9a1363
-
SHA1
14b80df7c7cd154275564d8678a99e99096bcbe4
-
SHA256
3af55470fb8f6549631c51af8fb360e144b3a2213328251fb5c893afefd39b2a
-
SHA512
ba37b738e73e85d8b4d5ec186c2469d533b94692f00ad07931287fed3bf3c7c9b17ed52f6e9289eb846ebfad25009d6ff1486880d91c45b63be96f276b45ba8f
-
SSDEEP
6144:qo5yDFBOGJBGmR9BJTGPbL5aFPB9Wxo8W2823a8kyXQ5iDoaPz73HyXMft6E:HgFt7hR9BJSPP5yBUxosXQ5koab73Hy2
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-