General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1346300805304549470/1346322522668531742/Vclient3.12-loader.bat?ex=67c7c40e&is=67c6728e&hm=ed28a976940f5e132d7890a8d3d189bf99a9e2b240f591d7f62365d8849d0c6f&
Resource
win11-20250217-en
23 signatures
600 seconds
Malware Config
Extracted
Family
xworm
C2
45.88.91.55:8893
Attributes
-
Install_directory
%ProgramData%
-
install_file
sys-32.exe
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1346300805304549470/1346322522668531742/Vclient3.12-loader.bat?ex=67c7c40e&is=67c6728e&hm=ed28a976940f5e132d7890a8d3d189bf99a9e2b240f591d7f62365d8849d0c6f&
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-