General

  • Target

    IntegoAntiVirus.bat

  • Size

    265KB

  • Sample

    250124-v5cn4szkas

  • MD5

    ea022218cf52320994c98e2f1b0e9f46

  • SHA1

    b17198bf147cd1905d909faf1cc08dee5402884f

  • SHA256

    fbc3a0a0fa908b5261b13f0cc740cca0d6cf7e298cdd1a0413b0e16944bc949f

  • SHA512

    576a8e622e224f58f5ff790c0fe21c2d4fe7a61614c81e9d6bac0c9ac0faae5674204232f1527e7aade3d9f37dde28627a43da0fd1291b42c9744db76d1f98f3

  • SSDEEP

    3072:JwE9dw4ei9DhjnnvKTcyvLzbwU9PVCuEcl+OAsssr00B/bIY6rFaYSs1Kn/cPTCq:+CdNeUrWD3tLHpguxB/IFLDrGuc0w4Cc

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Mutex

FNNdfYyntLqI4SWH

Attributes
  • Install_directory

    %ProgramData%

aes.plain

Targets

    • Target

      IntegoAntiVirus.bat

    • Size

      265KB

    • MD5

      ea022218cf52320994c98e2f1b0e9f46

    • SHA1

      b17198bf147cd1905d909faf1cc08dee5402884f

    • SHA256

      fbc3a0a0fa908b5261b13f0cc740cca0d6cf7e298cdd1a0413b0e16944bc949f

    • SHA512

      576a8e622e224f58f5ff790c0fe21c2d4fe7a61614c81e9d6bac0c9ac0faae5674204232f1527e7aade3d9f37dde28627a43da0fd1291b42c9744db76d1f98f3

    • SSDEEP

      3072:JwE9dw4ei9DhjnnvKTcyvLzbwU9PVCuEcl+OAsssr00B/bIY6rFaYSs1Kn/cPTCq:+CdNeUrWD3tLHpguxB/IFLDrGuc0w4Cc

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables RegEdit via registry modification

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks