General
-
Target
JStaller.bat
-
Size
836KB
-
Sample
250302-d4nljstmx6
-
MD5
2686275418180ce5c188c5baf0427da9
-
SHA1
764d86b850f03bc2a4fa88eaa9e4434ebe39ff54
-
SHA256
953405057021d4ff8844aaa231590871e03cf136e50b2f5e758853ca76802481
-
SHA512
a048d3251e0af5f1acf39f855a2226b82ca956dc826c4730279408e6cbc38b83ff7bfac5527c429ca39bf98a4a2b4571c853e87bd3554dbaf8b9f926090d8bb4
-
SSDEEP
24576:0Fz47fYHX8qCwPSCuV4LTjgltYVk39I1V+JV4BmU:0GoCwrfjgLU+Jwp
Static task
static1
Behavioral task
behavioral1
Sample
JStaller.bat
Resource
win11-20250217-en
Malware Config
Extracted
xworm
operates-rna.with.playit.plus:4377
-
Install_directory
%LocalAppData%
-
install_file
XClient2.0.exe
Targets
-
-
Target
JStaller.bat
-
Size
836KB
-
MD5
2686275418180ce5c188c5baf0427da9
-
SHA1
764d86b850f03bc2a4fa88eaa9e4434ebe39ff54
-
SHA256
953405057021d4ff8844aaa231590871e03cf136e50b2f5e758853ca76802481
-
SHA512
a048d3251e0af5f1acf39f855a2226b82ca956dc826c4730279408e6cbc38b83ff7bfac5527c429ca39bf98a4a2b4571c853e87bd3554dbaf8b9f926090d8bb4
-
SSDEEP
24576:0Fz47fYHX8qCwPSCuV4LTjgltYVk39I1V+JV4BmU:0GoCwrfjgLU+Jwp
Score10/10-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Blocklisted process makes network request
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-