General

  • Target

    https://cdn.discordapp.com/attachments/1346300805304549470/1346322522668531742/Vclient3.12-loader.bat?ex=67c7c40e&is=67c6728e&hm=ed28a976940f5e132d7890a8d3d189bf99a9e2b240f591d7f62365d8849d0c6f&

  • Sample

    250304-dz8e6ayses

Malware Config

Extracted

Family

xworm

C2

45.88.91.55:8893

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    sys-32.exe

Targets

    • Target

      https://cdn.discordapp.com/attachments/1346300805304549470/1346322522668531742/Vclient3.12-loader.bat?ex=67c7c40e&is=67c6728e&hm=ed28a976940f5e132d7890a8d3d189bf99a9e2b240f591d7f62365d8849d0c6f&

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks