General
-
Target
AntiRat.bat
-
Size
287KB
-
Sample
250125-pen2kaskhs
-
MD5
ed4aa7fdb67238c14fa9d266916e6eb3
-
SHA1
8df2185beef7c7a170bd53921effb4d9ff5d791a
-
SHA256
9478888ccb2e5bc3d4186efff2f45058783d2ef5aa25e351efb2448610388176
-
SHA512
97858e4ae2895213c3f140afe48ffd8e0682bdd28f64614896a1009476a2347138b780564fea969881182632c9e715d7af2c4ac1ac397c9d08ed69c7d044e5d7
-
SSDEEP
6144:afbEDtzm7hg0cIuKH5qGxXl4Vk6YupoHOzNW2TkJaiyIpQP:azE6pLHVx1k7oHqWHyICP
Static task
static1
Behavioral task
behavioral1
Sample
AntiRat.bat
Resource
win10ltsc2021-20250113-en
Malware Config
Targets
-
-
Target
AntiRat.bat
-
Size
287KB
-
MD5
ed4aa7fdb67238c14fa9d266916e6eb3
-
SHA1
8df2185beef7c7a170bd53921effb4d9ff5d791a
-
SHA256
9478888ccb2e5bc3d4186efff2f45058783d2ef5aa25e351efb2448610388176
-
SHA512
97858e4ae2895213c3f140afe48ffd8e0682bdd28f64614896a1009476a2347138b780564fea969881182632c9e715d7af2c4ac1ac397c9d08ed69c7d044e5d7
-
SSDEEP
6144:afbEDtzm7hg0cIuKH5qGxXl4Vk6YupoHOzNW2TkJaiyIpQP:azE6pLHVx1k7oHqWHyICP
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-