General
-
Target
echooff.bat
-
Size
2KB
-
Sample
250303-zl3teaywdy
-
MD5
1454db52a096ed81ab7ca936367ceabd
-
SHA1
25c32881677a892e4b9bc7d45d387bec22847685
-
SHA256
bf2edb2090118c826cb7fb3d3c7cbda1066bceaeaff02874d94f9ae940f2f09c
-
SHA512
a895401536357a07d9bd9167f5c36152a8e06c68bf6967b8540493c51fc1f8cfd4bd60cf68a094ebddf33e272c3c39fa753952bba3c0ca0cc39bfc1e939792c7
Static task
static1
Behavioral task
behavioral1
Sample
echooff.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
echooff.bat
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
137.184.74.73:5000
fEkivyZANGvej5MK
-
install_file
USB.exe
Targets
-
-
Target
echooff.bat
-
Size
2KB
-
MD5
1454db52a096ed81ab7ca936367ceabd
-
SHA1
25c32881677a892e4b9bc7d45d387bec22847685
-
SHA256
bf2edb2090118c826cb7fb3d3c7cbda1066bceaeaff02874d94f9ae940f2f09c
-
SHA512
a895401536357a07d9bd9167f5c36152a8e06c68bf6967b8540493c51fc1f8cfd4bd60cf68a094ebddf33e272c3c39fa753952bba3c0ca0cc39bfc1e939792c7
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-