General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1225566112306040944/1258428441439637635/TrustThis.bat?ex=67c85ed0&is=67c70d50&hm=20e94d244b8643fcd7ed0b5dc982c6192e9668f203a8bc64ec2d069947af5e1a&
Resource
win11-20250217-en
20 signatures
900 seconds
Malware Config
Extracted
Family
xworm
C2
paris-itself.gl.at.ply.gg:49485
Attributes
-
Install_directory
%Public%
-
install_file
USB.exe
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1225566112306040944/1258428441439637635/TrustThis.bat?ex=67c85ed0&is=67c70d50&hm=20e94d244b8643fcd7ed0b5dc982c6192e9668f203a8bc64ec2d069947af5e1a&
-
Detect Xworm Payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-