Resubmissions

30/05/2024, 09:37

240530-llqbeseb79 10

30/05/2024, 07:51

240530-jpvdfacb78 10

General

  • Target

    myxwr5cli.bat

  • Size

    379KB

  • Sample

    240530-jpvdfacb78

  • MD5

    03c6c2175f84ad54c989f0608d3cbb57

  • SHA1

    9846d7aa4c639d038f428977dfe0eef7db8ac009

  • SHA256

    6d04562cf9d1e0ee7b7c77af40e1e3299b6eba9375f35978d9776d94a9dae3d7

  • SHA512

    45bc9713a632904216f5bfd3e5648542382bc5c3aa8fa5253eea9f04d6592ac0aabcffc02451261210835f4f4d57c1f4895b7d02be24dd5edffbdc5e5b5e13c8

  • SSDEEP

    6144:xdlplCiywRsuBfq3Y3zzyMECoefagF68zh3IHstkjcGH9z2eRTbYXa8KZITbq:xrCiHWuBS3Y3zzyDCoefPQsy/qeF6KZl

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7001

134.255.233.93:7001

Mutex

5loUYH5mEGReJgAG

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      myxwr5cli.bat

    • Size

      379KB

    • MD5

      03c6c2175f84ad54c989f0608d3cbb57

    • SHA1

      9846d7aa4c639d038f428977dfe0eef7db8ac009

    • SHA256

      6d04562cf9d1e0ee7b7c77af40e1e3299b6eba9375f35978d9776d94a9dae3d7

    • SHA512

      45bc9713a632904216f5bfd3e5648542382bc5c3aa8fa5253eea9f04d6592ac0aabcffc02451261210835f4f4d57c1f4895b7d02be24dd5edffbdc5e5b5e13c8

    • SSDEEP

      6144:xdlplCiywRsuBfq3Y3zzyMECoefagF68zh3IHstkjcGH9z2eRTbYXa8KZITbq:xrCiHWuBS3Y3zzyDCoefPQsy/qeF6KZl

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks