General
-
Target
JStaller.bat
-
Size
836KB
-
Sample
250302-d8et7sttes
-
MD5
2686275418180ce5c188c5baf0427da9
-
SHA1
764d86b850f03bc2a4fa88eaa9e4434ebe39ff54
-
SHA256
953405057021d4ff8844aaa231590871e03cf136e50b2f5e758853ca76802481
-
SHA512
a048d3251e0af5f1acf39f855a2226b82ca956dc826c4730279408e6cbc38b83ff7bfac5527c429ca39bf98a4a2b4571c853e87bd3554dbaf8b9f926090d8bb4
-
SSDEEP
24576:0Fz47fYHX8qCwPSCuV4LTjgltYVk39I1V+JV4BmU:0GoCwrfjgLU+Jwp
Static task
static1
Behavioral task
behavioral1
Sample
JStaller.bat
Resource
win7-20240729-en
Malware Config
Extracted
xworm
operates-rna.with.playit.plus:4377
-
Install_directory
%LocalAppData%
-
install_file
XClient2.0.exe
Targets
-
-
Target
JStaller.bat
-
Size
836KB
-
MD5
2686275418180ce5c188c5baf0427da9
-
SHA1
764d86b850f03bc2a4fa88eaa9e4434ebe39ff54
-
SHA256
953405057021d4ff8844aaa231590871e03cf136e50b2f5e758853ca76802481
-
SHA512
a048d3251e0af5f1acf39f855a2226b82ca956dc826c4730279408e6cbc38b83ff7bfac5527c429ca39bf98a4a2b4571c853e87bd3554dbaf8b9f926090d8bb4
-
SSDEEP
24576:0Fz47fYHX8qCwPSCuV4LTjgltYVk39I1V+JV4BmU:0GoCwrfjgLU+Jwp
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-