General

  • Target

    SeroXenBuilder.exe

  • Size

    91KB

  • Sample

    240411-tmd9jsfb65

  • MD5

    8e298601185d24d6b8d9ba9d04eb4da8

  • SHA1

    308c42c588c7dffcbe895b32a62b7edb689db20a

  • SHA256

    f53553980b3b4a76cc4faf39f7338e20107f9fd6e1e65cf7f23185ced976f8c4

  • SHA512

    4dc01eb4753065753b463247fdb450cad69432924e9f1c156512d34c2d676f389ef5d6665cc8deda003187683a201b5114abd093b693fe999f9165b3bf0fb4f4

  • SSDEEP

    1536:dKgm3aS+IJ+fc3mPZoCGWvw+tWMeROVhTkbeIRR4LlV5/eEWCU8VQDDY4:dK33F+I8flo/SogVNBhV5GEyc4

Malware Config

Extracted

Family

xworm

C2

no-speed.gl.at.ply.gg:1836

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      SeroXenBuilder.exe

    • Size

      91KB

    • MD5

      8e298601185d24d6b8d9ba9d04eb4da8

    • SHA1

      308c42c588c7dffcbe895b32a62b7edb689db20a

    • SHA256

      f53553980b3b4a76cc4faf39f7338e20107f9fd6e1e65cf7f23185ced976f8c4

    • SHA512

      4dc01eb4753065753b463247fdb450cad69432924e9f1c156512d34c2d676f389ef5d6665cc8deda003187683a201b5114abd093b693fe999f9165b3bf0fb4f4

    • SSDEEP

      1536:dKgm3aS+IJ+fc3mPZoCGWvw+tWMeROVhTkbeIRR4LlV5/eEWCU8VQDDY4:dK33F+I8flo/SogVNBhV5GEyc4

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks