General
-
Target
skibidigenesis.bat
-
Size
397KB
-
Sample
250304-3vf8jstnw7
-
MD5
72c4399da0d8899b4e60ba732d20ac70
-
SHA1
ff22be71d8e3be9473c711a997619804588c8dbc
-
SHA256
39532fe4477427729c951df53e455c6e67925adf3920138063e0064531ccc1c4
-
SHA512
58a928f109ae7a1ef307ca7babfe44ed218095d2bd7f4d637acf1d145be6d7fbb95d038d743c42b72f605c77fe5cbca603baca224e36e48e4c063ebb1b20a6df
-
SSDEEP
12288:1+WS3omtKVLLk59mhJi1GKIuVHhp3oPOLxc1jAFtr3kggy:QWBDLQ54kHjoP4iVobkggy
Static task
static1
Behavioral task
behavioral1
Sample
skibidigenesis.bat
Resource
win7-20241010-en
Malware Config
Extracted
xworm
193.161.193.99:59410
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
skibidigenesis.bat
-
Size
397KB
-
MD5
72c4399da0d8899b4e60ba732d20ac70
-
SHA1
ff22be71d8e3be9473c711a997619804588c8dbc
-
SHA256
39532fe4477427729c951df53e455c6e67925adf3920138063e0064531ccc1c4
-
SHA512
58a928f109ae7a1ef307ca7babfe44ed218095d2bd7f4d637acf1d145be6d7fbb95d038d743c42b72f605c77fe5cbca603baca224e36e48e4c063ebb1b20a6df
-
SSDEEP
12288:1+WS3omtKVLLk59mhJi1GKIuVHhp3oPOLxc1jAFtr3kggy:QWBDLQ54kHjoP4iVobkggy
-
Detect Xworm Payload
-
Modifies firewall policy service
-
Modifies security service
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-