Want More XWorm?, (Wed, Mar 4th)
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。直接写描述就行。 首先,我需要快速浏览一下文章。看起来这篇文章是关于XWorm恶意软件的最新一波攻击。XWorm不是新的,但传播方式一直在变化。这次攻击使用了多技术的恶意软件,包括JavaScript、PowerShell脚本和DLL注入。 文章提到JavaScript是经典的混淆代码,运行后会释放一个PowerShell脚本到临时目录。这个脚本解码另一个payload,使用Base64和XOR加密。最终payload是一个DLL,名为MAD.dll,它执行进程空洞注入,将XWorm客户端注入到.Net编译器进程中。 配置文件显示C2服务器的IP地址与之前检测到的一致,还有一些IOC信息,比如文件名和SHA256哈希值。 所以,总结起来,这篇文章主要描述了XWorm恶意软件的新一波攻击活动,包括其传播机制、技术细节以及与之前攻击的关联。 接下来,我需要用简洁的语言把这些要点浓缩到100字以内。确保涵盖恶意软件名称、传播方式、技术细节(如混淆、加密、注入)以及与之前攻击的关联。 </think> 这篇文章描述了XWorm恶意软件的新一波攻击活动,其通过混淆的JavaScript释放PowerShell脚本,解码并执行加密payload,最终通过DLL进程空洞注入技术将自身注入.Net编译器进程,配置显示其C2服务器IP与之前检测结果一致。 2026-3-4 09:48:39 Author: isc.sans.edu(查看原文) 阅读量:8 收藏

And another XWorm[1] wave in the wild! This malware family is not new and heavily spread but delivery techniques always evolve and deserve to be described to show you how threat actors can be imaginative! This time, we are facing another piece of multi-technology malware.

Here is a quick overview:

The Javascript is a classic obfuscated one:

No need to try to analyze it, just let it run in a sandbox and see its magic. It will drop a PowerShell script in a temporary directory (“C:\Temp\ps_5uGUQcco8t5W_1772542824586.ps1”). This loader will decode (Base64 + XOR) another payload that invokes another piece of PowerShell in memory:

Because the last payload is XOR-encrypted, it is not obfuscated and easy to understand. The DLL exports a function called “ProcessHollowing” (nice name, btw) and acts as a loader. It inject the XWorm client in the .Net compiler process…

Here is the extracted config:

{
    "c2": [
        "204[.]10[.]160[.]190:7003"
    ],
    "attr": {
        "install_file": "USB.exe"
    },
    "keys": [
        {
            "key": "aes_key",
            "kind": "aes.plain",
            "value": "XAorWEAzx4+ic89KWd910w=="
        }
    ],
    "rule": "Xworm",
    "mutex": [
        "Cqu1F0NxohroKG5U"
    ],
    "family": "xworm",
    "version": "XWorm V6.4"
}

Do you recognize the C2 IP address? It's the same as the one detected in my latest diary![2]

And some IOC's:

File SHA256
Inv-4091-CBM-4091-CUSTOM-Packing_List.js 5140b02a05b7e8e0c0afbb459e66de4d74f79665c1d83419235ff0cdcf046e9c
ps_5uGUQcco8t5W_1772542824586.ps1 5a3d33efaaff4ef7b7d473901bd1eec76dcd9cf638213c7d1d3b9029e2aa99a4
MAD.dll af3919de04454af9ed2ffa7f34e4b600b3ce24168f745dba4c372eb8bcc22a21
payload.exe (XWorm) 58e38fffb78964300522d89396f276ae0527def8495126ff036e57f0e8d3c33b

[1] https://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
[2] https://isc.sans.edu/diary/Fake%20Fedex%20Email%20Delivers%20Donuts!/32754

Xavier Mertens (@xme)
Xameco
Senior ISC Handler - Freelance Cyber Security Consultant
PGP Key


文章来源: https://isc.sans.edu/diary/rss/32766
如有侵权请联系:admin#unsafe.sh