General
-
Target
EXM Free Tweaking Utility V8.3 LEAKED 2025.bat
-
Size
671KB
-
Sample
250508-y7rgtsxnx3
-
MD5
483423f13894ad21cd9c37a2a5adae19
-
SHA1
fe6bb76d64a8df56318db98c3fc9c471bacaa82c
-
SHA256
1c9ed30b893b83b29d285cc8b37bdba353ab18dab8288e44a367162fb536c609
-
SHA512
5f050acfcedbaf60bde9c0e028a7685a520e284ca17cd0b52c28a94dde75948324bc0738a5ba965ca26e39e55c6861af63bef23546af2b074a7940e329e719c6
-
SSDEEP
3072:uGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:uGiVNEn14IZVvisL43
Static task
static1
Behavioral task
behavioral1
Sample
EXM Free Tweaking Utility V8.3 LEAKED 2025.bat
Resource
win10ltsc2021-20250425-en
Behavioral task
behavioral2
Sample
EXM Free Tweaking Utility V8.3 LEAKED 2025.bat
Resource
win11-20250502-en
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/ZnhxAV6a
-
telegram
https://api.telegram.org/bot7564421410:AAHgBw2xu-96C8rVIiibt59lzDnMAPliOm4/sendMessage?chat_id=7741783264
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7564421410:AAHgBw2xu-96C8rVIiibt59lzDnMAPliOm4/sendMessage?chat_id=7741783264
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
gurcu
https://api.telegram.org/bot7564421410:AAHgBw2xu-96C8rVIiibt59lzDnMAPliOm4/sendMessage?chat_id=7741783264
Targets
-
-
Target
EXM Free Tweaking Utility V8.3 LEAKED 2025.bat
-
Size
671KB
-
MD5
483423f13894ad21cd9c37a2a5adae19
-
SHA1
fe6bb76d64a8df56318db98c3fc9c471bacaa82c
-
SHA256
1c9ed30b893b83b29d285cc8b37bdba353ab18dab8288e44a367162fb536c609
-
SHA512
5f050acfcedbaf60bde9c0e028a7685a520e284ca17cd0b52c28a94dde75948324bc0738a5ba965ca26e39e55c6861af63bef23546af2b074a7940e329e719c6
-
SSDEEP
3072:uGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:uGiVNEn14IZVvisL43
-
Asyncrat family
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Detect Xworm Payload
-
Gurcu family
-
StormKitty payload
-
Stormkitty family
-
UAC bypass
-
Xworm family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
3PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3