General

  • Target

    build.exe

  • Size

    2.0MB

  • Sample

    240623-x8gtcazclb

  • MD5

    08de348dbc41254225f0add6f5b4141f

  • SHA1

    f204037a312dc5acfde0e5fd5a70e44cc6d48b52

  • SHA256

    45093ec78be52109e89a0f7903bd5cfa6e4fa66a18213e05b2cefacf39b5aa53

  • SHA512

    d08a2f33696ef122ccdf8851d575d444d770bc091de7abce37c9bc2e68a77d1f014f852fdc3b1e4b5650b06c0e874429a7b56e89fa5aad5c895c5d09acb6251a

  • SSDEEP

    49152:gKJli+vbjfgv8GHpq8EMAy1IaD9O+neb3:/bXeVA1aA+neb

Malware Config

Extracted

Family

xworm

C2

45.88.90.228:7000

178.215.236.228:7000

Attributes
  • Install_directory

    %Public%

  • install_file

    RtkAudUService64.exe

Targets

    • Target

      build.exe

    • Size

      2.0MB

    • MD5

      08de348dbc41254225f0add6f5b4141f

    • SHA1

      f204037a312dc5acfde0e5fd5a70e44cc6d48b52

    • SHA256

      45093ec78be52109e89a0f7903bd5cfa6e4fa66a18213e05b2cefacf39b5aa53

    • SHA512

      d08a2f33696ef122ccdf8851d575d444d770bc091de7abce37c9bc2e68a77d1f014f852fdc3b1e4b5650b06c0e874429a7b56e89fa5aad5c895c5d09acb6251a

    • SSDEEP

      49152:gKJli+vbjfgv8GHpq8EMAy1IaD9O+neb3:/bXeVA1aA+neb

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks