Concrete signature match: Backdoor - Provides unauthorized remote access for .NET (Microsoft Intermediate Language) platform, family XWormRAT
This is a concrete detection of XWormRAT, a .NET-based Remote Access Trojan (RAT). The technical analysis confirms its ability to establish persistence via Scheduled Tasks, execute commands using system utilities like PowerShell and rundll32, and hook system functions to potentially steal data, giving an attacker remote control over the compromised machine.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT) No specific strings found for this threat
rule Trojan_Win64_XWormRAT_A_2147891366_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win64/XWormRAT.A!MTB"
threat_id = "2147891366"
type = "Trojan"
platform = "Win64: Windows 64-bit platform"
family = "XWormRAT"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "6"
strings_accuracy = "High"
strings:
$x_2_1 = "go-runpe" ascii //weight: 2
$x_2_2 = "cipher.NewCFBDecrypter" ascii //weight: 2
$x_2_3 = "ioutil.TempDir" ascii //weight: 2
condition:
(filesize < 20MB) and
(all of ($x*))
}78d390316afdd752af4ac8648ef90a51329291c2c13f80509c4163b9bab177bfbf405d5470cb9900f08371031043f5c7c7a790fbc2af3b7d1fe43f9dbca1b705Immediately isolate the affected machine from the network. Use an updated antivirus to perform a full scan and remove all detected components. Since this is a RAT, assume full system compromise: change all passwords associated with the machine and its users, and consider re-imaging the device to ensure complete threat removal.