Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    185.7.214_1.211.cmd

  • Size

    172B

  • Sample

    250228-hz1grstwfz

  • MD5

    e3f9c42a3eee3a73f89685a8c2cc027e

  • SHA1

    9d934754caf36aeb28f239f0011bedc4f68138f5

  • SHA256

    2ce52ae9ba8114731368521d8dfdc951e901d13316ebaca8231ab398ae69c85a

  • SHA512

    51d8caf7b1dad18417c236660e7c87b7bbf5a96b0bd78166eb3897b995938708767d1ad0e32250dc246d88f40838e228154d7028ecf708e4b54fea7f0fde57a9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://185.7.214.211/a.mp4

Extracted

Family

xworm

Version

5.0

C2

185.7.214.211:4444

aes.plain

Targets

    • Target

      185.7.214_1.211.cmd

    • Size

      172B

    • MD5

      e3f9c42a3eee3a73f89685a8c2cc027e

    • SHA1

      9d934754caf36aeb28f239f0011bedc4f68138f5

    • SHA256

      2ce52ae9ba8114731368521d8dfdc951e901d13316ebaca8231ab398ae69c85a

    • SHA512

      51d8caf7b1dad18417c236660e7c87b7bbf5a96b0bd78166eb3897b995938708767d1ad0e32250dc246d88f40838e228154d7028ecf708e4b54fea7f0fde57a9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks