Hunt package for 5 IOCs associated with XWorm
Malware Family: XWorm Total IOCs: 5 IOC Types: ip:port, domain
| Type | Value | Threat Type | First Seen | Confidence |
|---|---|---|---|---|
| domain | ayidhh-48261.portmap.host | botnet_cc | 2026-03-19 | 100% |
| domain | aliowiasidaids-62178.portmap.host | botnet_cc | 2026-03-19 | 100% |
| domain | sex4fun.duckdns.org | botnet_cc | 2026-03-19 | 100% |
| ip:port | 41[.]45[.]156[.]241:5505 | botnet_cc | 2026-03-18 | 100% |
| ip:port | 154[.]219[.]104[.]140:7007 | botnet_cc | 2026-03-18 | 100% |
// Hunt for network connections to known malicious IPs
// Source: ThreatFox - XWorm
let malicious_ips = dynamic(["154.219.104.140", "41.45.156.241"]);
CommonSecurityLog
| where DestinationIP in (malicious_ips) or SourceIP in (malicious_ips)
| project TimeGenerated, SourceIP, DestinationIP, DestinationPort, DeviceAction, Activity
| order by TimeGenerated desc
// Hunt in Defender for Endpoint network events
let malicious_ips = dynamic(["154.219.104.140", "41.45.156.241"]);
DeviceNetworkEvents
| where RemoteIP in (malicious_ips)
| project Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessFileName, ActionType
| order by Timestamp desc
// Hunt for DNS queries to known malicious domains
// Source: ThreatFox - XWorm
let malicious_domains = dynamic(["ayidhh-48261.portmap.host", "aliowiasidaids-62178.portmap.host", "sex4fun.duckdns.org"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses, QueryType
| order by TimeGenerated desc
| Sentinel Table | Notes |
|---|---|
CommonSecurityLog | Ensure this data connector is enabled |
DeviceNetworkEvents | Ensure this data connector is enabled |
DnsEvents | Ensure this data connector is enabled |