XWorm Cocktail: A Mix of PE data with PowerShell Code

Feb. 19, 2025, 7:56 p.m.

Description

A malicious file discovered on VirusTotal triggered a PowerShell rule, leading to the investigation of two closely related files identified as 'data files' but named as executables. The files contain a mix of PowerShell code, binary data, and obfuscated text. Analysis revealed characteristics of XWorm malware, including functions for system manipulation, data exfiltration, and keylogging. The obfuscation technique involves Base64 encoding, compression, and mathematical operations combined with logical operands. The malware attempts to evade detection, create persistence, and perform various malicious activities. The investigation highlights the complexity of modern malware obfuscation techniques and the challenges in deobfuscating such threats.

Date

  • Created: Feb. 19, 2025, 4:12 p.m.
  • Published: Feb. 19, 2025, 4:12 p.m.
  • Modified: Feb. 19, 2025, 7:56 p.m.

Indicators

  • d0b448d4de707a9fb611166278065afa2c52029234f7876158c8dd4798f08f9f
  • add19a9db4730f41575fb951e9aec6dcf35d8db2cb94cba896667881467e6fd5
  • 7c2f2a9a6078d37ee241e43f392f825630016c8ca8416bfd12cd27501b6876d1

Attack Patterns

  • XWorm
  • T1546.011
  • T1543.003
  • T1053.005
  • T1136
  • T1497.001
  • T1059.003
  • T1059.001
  • T1547.001
  • T1087
  • T1056.001
  • T1071.001
  • T1518.001
  • T1562.001
  • T1016
  • T1082
  • T1105
  • T1083
  • T1140
  • T1027
  • T1112