Heavily obfuscated batch file loads XWorm hosted on GitHub
VMRay Labs found a multi-stage obfuscated batch script 2025-1-20 11:12:21 Author: www.vmray.com(查看原文) 阅读量:13 收藏

VMRay Labs found a multi-stage obfuscated batch script with low detections on VirusTotal which downloads and executes XWorm from GitHub.

The sample uses a UTF-16 Byte Order Marker and an open source Batch obfuscator to hinder manual analysis.

The sample had 7/61 detections on VirusTotal as of January 17th, 2025.

7 / 61 detections on VirusTotal

In a nutshell:

  • Low detection rate on VirusTotal (7/61)
  • Abuses UTF-16 Byte Order Marker to confuse text editors (0xFFFE)
  • Uses cacls.exe to verify whether the process is running with admin privileges
  • Drops a VBS script to prompt a UAC dialog to elevate privileges
  • Adjusts Windows Defender exclusion paths via PowerShell
  • Downloads an instance of XWorm from a GitHub repository into a hidden file and executes it
  • Batch → VBS → Batch → GitHub → XWorm

Dive deeper into the report

Sample SHA256:

96cc09ef13054fe37778f15fa87202e727832895f9712f68a18618fcb5c24ef1

See why we think this is malicious in plain language.

See the whole path of the sample’s execution

Map the malicious activities on the MITRE ATT&CK Framework

Explore detailed information on the IP addresses, URLs and DNS, including function logs and PCAP Streams

Download the IOCs and artifacts to have a clear picture of the threat.

Download the files that the malware downloads, drops or modifies.

Explore how you can use these insights


文章来源: https://www.vmray.com/heavily-obfuscated-batch-file-loads-xworm-hosted-on-github/
如有侵权请联系:admin#unsafe.sh