General

  • Target

    Registry.exe

  • Size

    77KB

  • Sample

    240722-xrm9sstbqk

  • MD5

    9d6650618c58c87940342a370a32e509

  • SHA1

    c579fae20e78573deeec2059c8119083ccdff7e2

  • SHA256

    b9254a6ecd096658f98b82ebb751201b4e447b5ce3b7302b48fb228c9b516c23

  • SHA512

    d37b31b2c9669980279e2ebf247811ddd2f43231766a735b8a904dd9de1034e10a5fb7ee23c80717f88d5e173b0ee84ee890b95f50e71590b57e03d8b81d6020

  • SSDEEP

    1536:BQa31Z6Y6BFzJufgQIUbmVCcGDl4gBQOV8EaKiRE:BQZhB5IYTUbm1Yl4SQOV8EqE

Malware Config

Extracted

Family

xworm

C2

147.185.221.20:49485

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    System.exe

Targets

    • Target

      Registry.exe

    • Size

      77KB

    • MD5

      9d6650618c58c87940342a370a32e509

    • SHA1

      c579fae20e78573deeec2059c8119083ccdff7e2

    • SHA256

      b9254a6ecd096658f98b82ebb751201b4e447b5ce3b7302b48fb228c9b516c23

    • SHA512

      d37b31b2c9669980279e2ebf247811ddd2f43231766a735b8a904dd9de1034e10a5fb7ee23c80717f88d5e173b0ee84ee890b95f50e71590b57e03d8b81d6020

    • SSDEEP

      1536:BQa31Z6Y6BFzJufgQIUbmVCcGDl4gBQOV8EaKiRE:BQZhB5IYTUbm1Yl4SQOV8EqE

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks