General

  • Target

    itsme.exe

  • Size

    231KB

  • Sample

    240723-119qyavbqe

  • MD5

    f2f94444de88eb15899bac1496d588b6

  • SHA1

    f325369f4f20ab22256983d3e712e2dab231ae0f

  • SHA256

    09e3694ca05efd4f0a91f3e4ff2569e3fd06c68105fa76990dc38125c745be0a

  • SHA512

    67bc23811817fab189ac25706eee34debc73647a9b7407bece9a6cbf103970d2192d009197e3c450533474d8da64bfc2991c72df0182a14d0a76fdd8090427de

  • SSDEEP

    6144:IrFRVUS82CAiVYcgIRYHYhvtug68eOcmk1:IrFQFmYbuGc

Malware Config

Extracted

Family

xworm

Version

3.0

C2

increased-wage.gl.at.ply.gg:9707

Mutex

XvYKEJ5veEhlOGBW

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      itsme.exe

    • Size

      231KB

    • MD5

      f2f94444de88eb15899bac1496d588b6

    • SHA1

      f325369f4f20ab22256983d3e712e2dab231ae0f

    • SHA256

      09e3694ca05efd4f0a91f3e4ff2569e3fd06c68105fa76990dc38125c745be0a

    • SHA512

      67bc23811817fab189ac25706eee34debc73647a9b7407bece9a6cbf103970d2192d009197e3c450533474d8da64bfc2991c72df0182a14d0a76fdd8090427de

    • SSDEEP

      6144:IrFRVUS82CAiVYcgIRYHYhvtug68eOcmk1:IrFQFmYbuGc

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks