Heavily obfuscated batch file loads XWorm hosted on GitHub
VMRay Labs found a multi-stage obfuscated batch script
2025-1-20 11:12:21
Author: www.vmray.com(查看原文)
阅读量:13
收藏
VMRay Labs found a multi-stage obfuscated batch script with low detections on VirusTotal which downloads and executes XWorm from GitHub.
The sample uses a UTF-16 Byte Order Marker and an open source Batch obfuscator to hinder manual analysis.
The sample had 7/61 detections on VirusTotal as of January 17th, 2025.
7 / 61 detections on VirusTotal
In a nutshell:
- Low detection rate on VirusTotal (7/61)
- Abuses UTF-16 Byte Order Marker to confuse text editors (0xFFFE)
- Uses cacls.exe to verify whether the process is running with admin privileges
- Drops a VBS script to prompt a UAC dialog to elevate privileges
- Adjusts Windows Defender exclusion paths via PowerShell
- Downloads an instance of XWorm from a GitHub repository into a hidden file and executes it
- Batch → VBS → Batch → GitHub → XWorm
Dive deeper into the report
Sample SHA256:
96cc09ef13054fe37778f15fa87202e727832895f9712f68a18618fcb5c24ef1
See why we think this is malicious in plain language.
See the whole path of the sample’s execution
Map the malicious activities on the MITRE ATT&CK Framework
Explore detailed information on the IP addresses, URLs and DNS, including function logs and PCAP Streams
Download the IOCs and artifacts to have a clear picture of the threat.
Download the files that the malware downloads, drops or modifies.
Explore how you can use these insights
文章来源: https://www.vmray.com/heavily-obfuscated-batch-file-loads-xworm-hosted-on-github/
如有侵权请联系:admin#unsafe.sh