General

  • Target

    XClient.exe

  • Size

    70KB

  • Sample

    240519-t1a42sfd72

  • MD5

    986c92248d5585957d3e4f948500f56b

  • SHA1

    9399aa1bd7a7e7fc63aadcb0a3f760ec4690c5c8

  • SHA256

    97cb73c6ce72015acbe54c824936d9bce5a060602e285b2d4c37f9cbb4383417

  • SHA512

    0182a0622fcd0ca06002096fb51642cc71950eb31645a1ddb57b714e74879216cb69bd4f8ffef57ec6d5781316587c73bd267fd9444b22b11e24a549e92c182a

  • SSDEEP

    1536:NxrAa0NXH/Tv9Q68C+b59sTxMqfHTOmDdh5PqB:YT37lQxC+b59sxLHTOmDH0B

Malware Config

Extracted

Family

xworm

C2

https://pastebin.com/raw/1YQct0um:2001

Attributes
  • Install_directory

    %Temp%

  • install_file

    Fixer.exe

  • pastebin_url

    https://pastebin.com/raw/1YQct0um

Targets

    • Target

      XClient.exe

    • Size

      70KB

    • MD5

      986c92248d5585957d3e4f948500f56b

    • SHA1

      9399aa1bd7a7e7fc63aadcb0a3f760ec4690c5c8

    • SHA256

      97cb73c6ce72015acbe54c824936d9bce5a060602e285b2d4c37f9cbb4383417

    • SHA512

      0182a0622fcd0ca06002096fb51642cc71950eb31645a1ddb57b714e74879216cb69bd4f8ffef57ec6d5781316587c73bd267fd9444b22b11e24a549e92c182a

    • SSDEEP

      1536:NxrAa0NXH/Tv9Q68C+b59sTxMqfHTOmDdh5PqB:YT37lQxC+b59sxLHTOmDH0B

    • Detect Xworm Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Query Registry

6
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

5
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks