General

  • Target

    EspoofferFixed.bat

  • Size

    265KB

  • Sample

    250124-sf5mgstqat

  • MD5

    f1de9472d7d6f32316659e4fa2296a82

  • SHA1

    51841c6da4684262484d072da2ee35d35892e657

  • SHA256

    93ae0ded8e229de092b27587159e255496e62680285077c17f501b3d1770965e

  • SHA512

    3843dfbe878b9a608f532dbbe9b56e722e21598cf99f2819ed3876b7fe27af7d319fa18ca5060bff219bf039703e53e79bd3186e7acdfa833f1e2e5378807fbb

  • SSDEEP

    6144:WWrN/c6ctnMWD0qABdaTK2tJ75HsTD6MIy:WWxk6eMI0qABdG1tp5MTDvT

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Mutex

GgTsuAV3pXf6aU6z

aes.plain

Targets

    • Target

      EspoofferFixed.bat

    • Size

      265KB

    • MD5

      f1de9472d7d6f32316659e4fa2296a82

    • SHA1

      51841c6da4684262484d072da2ee35d35892e657

    • SHA256

      93ae0ded8e229de092b27587159e255496e62680285077c17f501b3d1770965e

    • SHA512

      3843dfbe878b9a608f532dbbe9b56e722e21598cf99f2819ed3876b7fe27af7d319fa18ca5060bff219bf039703e53e79bd3186e7acdfa833f1e2e5378807fbb

    • SSDEEP

      6144:WWrN/c6ctnMWD0qABdaTK2tJ75HsTD6MIy:WWxk6eMI0qABdG1tp5MTDvT

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks