General

  • Target

    SolaraB.rar

  • Size

    5KB

  • Sample

    240624-f9v9paycnb

  • MD5

    b0bf490eeffd0865ab8cd515c6481045

  • SHA1

    927fc43e6618c05bd8217d2ce57c48077d41d468

  • SHA256

    e2f53b76060c0115efe12f3e6a8c2f0b27caed7a4d471b85d318b21de6cfe0c7

  • SHA512

    99d985a286fff264e9c01b509d85cba16db8fb039dd0f340db686d62a4b7c31e561d4d8d0e3ee83a676c47665ac009ac027bdf32071bb1080ea4839cdd4ce7b3

  • SSDEEP

    96:rAIVQw/rL3C/bqDiEuUkjRd0BVrKiFAyWgswkJUlilSQgNMesB:rrTYbokY7tlWgshULx+esB

Malware Config

Extracted

Family

xworm

C2

anyone-blogging.gl.at.ply.gg:22284

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    XClient.exe

Targets

    • Target

      SolaraB/SolaraBootstrapper.exe

    • Size

      13KB

    • MD5

      8be476fb431fcf11156417f410acf978

    • SHA1

      55a19def82358ffc006487e1f49be04277e12bd5

    • SHA256

      14cf7648123e018dcdfc2aa386135a0510a9f7b12b8bc125ad4e32fd7f16999c

    • SHA512

      cf747947ff0bedf87230e0fa08ee534f44f08962a52ae3dd0c0d734d6f4131456a0e2dc1ac230fa6500d5b254a64cae9e01161d1a690e26794c38d66e22cb5ed

    • SSDEEP

      192:IUxOQrGVa/nHU0LgJ2jaVb4+LHdrDXy3pifUJ1hHxrWjd:hIQaVafU0LmqaVb4+xPy5ifU1hRyj

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks