General
-
Target
VMenu3.121fix1.bat
-
Size
527KB
-
Sample
250305-ej7pcsykz2
-
MD5
3d1653ee332959fc6ea17400cdb636bd
-
SHA1
3a75f6b73477b63300bc1065caaa7c9af066b6b4
-
SHA256
fdb0641302824a729dcdbf6235a60a7661ee14951f82cc486cf0a874e8c38e1e
-
SHA512
6eaaf2c0cd2322dcb9fcd71d030afaabaf13b0ed881fafe8db569da5cb2e196147045105067b3d5dc9aa80d2c61d44d6f063b82c74f6954b5bb956e4597e0b06
-
SSDEEP
6144:BLG0TmgMe4wGS6I4LjSAeEP3xI0r+/nBkJgrICpdZGz2LDpb5uZ8OaE2i88tmKb4:BCZgMe46AeSBHoBigr3ZnLjmsi4xq/G
Static task
static1
Behavioral task
behavioral1
Sample
VMenu3.121fix1.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
operates-rna.with.playit.plus:4377
-
Install_directory
%LocalAppData%
-
install_file
XClient2.0.exe
Targets
-
-
Target
VMenu3.121fix1.bat
-
Size
527KB
-
MD5
3d1653ee332959fc6ea17400cdb636bd
-
SHA1
3a75f6b73477b63300bc1065caaa7c9af066b6b4
-
SHA256
fdb0641302824a729dcdbf6235a60a7661ee14951f82cc486cf0a874e8c38e1e
-
SHA512
6eaaf2c0cd2322dcb9fcd71d030afaabaf13b0ed881fafe8db569da5cb2e196147045105067b3d5dc9aa80d2c61d44d6f063b82c74f6954b5bb956e4597e0b06
-
SSDEEP
6144:BLG0TmgMe4wGS6I4LjSAeEP3xI0r+/nBkJgrICpdZGz2LDpb5uZ8OaE2i88tmKb4:BCZgMe46AeSBHoBigr3ZnLjmsi4xq/G
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-