20 January 2025
VMRay Labs found a multi-stage obfuscated batch script with low detections on VirusTotal which downloads and executes XWorm from GitHub.
Â
The sample uses a UTF-16 Byte Order Marker and an open source Batch obfuscator to hinder manual analysis.
The sample had 7/61 detections on VirusTotal as of January 17th, 2025.
In a nutshell:
Sample SHA256:
96cc09ef13054fe37778f15fa87202e727832895f9712f68a18618fcb5c24ef1
Threat identifiers
See why we think this is malicious in plain language.
Process map
See the whole path of the sample’s execution
MITRE ATT&CK Matrix
Map the malicious activities on the MITRE ATT&CK Framework
Network connections
Explore detailed information on the IP addresses, URLs and DNS, including function logs and PCAP Streams
Pre-filtered IOCs
Download the IOCs and artifacts to have a clear picture of the threat.
Files
Download the files that the malware downloads, drops or modifies.
Explore how you can use these insights
Incident Response
Threat Hunting
Ready to stress-test your malware sandbox? Join us for a no-fluff, all-demo webinar that shows you real techniques to evaluate and optimize your sandboxing solution!