General
-
Target
IntegoAntiVirus.bat
-
Size
265KB
-
Sample
250124-v5cn4szkas
-
MD5
ea022218cf52320994c98e2f1b0e9f46
-
SHA1
b17198bf147cd1905d909faf1cc08dee5402884f
-
SHA256
fbc3a0a0fa908b5261b13f0cc740cca0d6cf7e298cdd1a0413b0e16944bc949f
-
SHA512
576a8e622e224f58f5ff790c0fe21c2d4fe7a61614c81e9d6bac0c9ac0faae5674204232f1527e7aade3d9f37dde28627a43da0fd1291b42c9744db76d1f98f3
-
SSDEEP
3072:JwE9dw4ei9DhjnnvKTcyvLzbwU9PVCuEcl+OAsssr00B/bIY6rFaYSs1Kn/cPTCq:+CdNeUrWD3tLHpguxB/IFLDrGuc0w4Cc
Static task
static1
Behavioral task
behavioral1
Sample
IntegoAntiVirus.bat
Resource
win11-20241007-en
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
FNNdfYyntLqI4SWH
-
Install_directory
%ProgramData%
Targets
-
-
Target
IntegoAntiVirus.bat
-
Size
265KB
-
MD5
ea022218cf52320994c98e2f1b0e9f46
-
SHA1
b17198bf147cd1905d909faf1cc08dee5402884f
-
SHA256
fbc3a0a0fa908b5261b13f0cc740cca0d6cf7e298cdd1a0413b0e16944bc949f
-
SHA512
576a8e622e224f58f5ff790c0fe21c2d4fe7a61614c81e9d6bac0c9ac0faae5674204232f1527e7aade3d9f37dde28627a43da0fd1291b42c9744db76d1f98f3
-
SSDEEP
3072:JwE9dw4ei9DhjnnvKTcyvLzbwU9PVCuEcl+OAsssr00B/bIY6rFaYSs1Kn/cPTCq:+CdNeUrWD3tLHpguxB/IFLDrGuc0w4Cc
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Disables RegEdit via registry modification
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-