General

  • Target

    d0ec40d1ae32bddb9159e4daa86d2b15535fe6cd456f8251d78fe64667d8abb1_JC.js

  • Size

    7KB

  • Sample

    231010-wwhz7sfe4v

  • MD5

    4e0ea5c5808c3d0cf7006eb0ef347c4b

  • SHA1

    80f8f2d5b7caf2f13b1edd764e56f46930754edc

  • SHA256

    d0ec40d1ae32bddb9159e4daa86d2b15535fe6cd456f8251d78fe64667d8abb1

  • SHA512

    40745410c37e8cf392c59ca9c8d04779c96624eefe7b8f90f3876f8c54c60518a622db9553b0420f77b34582a586ec68b664089f909e37043a11c0d9734a44d4

  • SSDEEP

    48:iVnz7HAx3ZSGwW6PnWe28gR7osdSrwyNNgnw5:itfHAx3ZzwWKWTnR7o8SrwqNgnw5

Malware Config

Extracted

Family

xworm

Version

3.1

C2

lee44.kozow.com:4548

Mutex

Nkk86vl4S3wOFCBy

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

wshrat

C2

http://chongmei33.publicvm.com:7045

Targets

    • Target

      d0ec40d1ae32bddb9159e4daa86d2b15535fe6cd456f8251d78fe64667d8abb1_JC.js

    • Size

      7KB

    • MD5

      4e0ea5c5808c3d0cf7006eb0ef347c4b

    • SHA1

      80f8f2d5b7caf2f13b1edd764e56f46930754edc

    • SHA256

      d0ec40d1ae32bddb9159e4daa86d2b15535fe6cd456f8251d78fe64667d8abb1

    • SHA512

      40745410c37e8cf392c59ca9c8d04779c96624eefe7b8f90f3876f8c54c60518a622db9553b0420f77b34582a586ec68b664089f909e37043a11c0d9734a44d4

    • SSDEEP

      48:iVnz7HAx3ZSGwW6PnWe28gR7osdSrwyNNgnw5:itfHAx3ZzwWKWTnR7o8SrwqNgnw5

    • Detect Xworm Payload

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks