General

  • Target

    https://www.upload.ee/files/16472471/XWorm_V5.6.rar.html

  • Sample

    240414-ljbp9aff54

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

sgC4GcOTq0MyOKDT

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/H3wFXmEi

aes.plain

Targets

    • Target

      https://www.upload.ee/files/16472471/XWorm_V5.6.rar.html

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Modifies Windows Firewall

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Scripting

1
T1064

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks