General

  • Target

    https://cdn.discordapp.com/attachments/1225566112306040944/1258428441439637635/TrustThis.bat?ex=67c85ed0&is=67c70d50&hm=20e94d244b8643fcd7ed0b5dc982c6192e9668f203a8bc64ec2d069947af5e1a&

  • Sample

    250304-t4vmvsvrz5

Malware Config

Extracted

Family

xworm

C2

paris-itself.gl.at.ply.gg:49485

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

Targets

    • Target

      https://cdn.discordapp.com/attachments/1225566112306040944/1258428441439637635/TrustThis.bat?ex=67c85ed0&is=67c70d50&hm=20e94d244b8643fcd7ed0b5dc982c6192e9668f203a8bc64ec2d069947af5e1a&

    • Detect Xworm Payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks