General

  • Target

    skrLoader .exe

  • Size

    2.5MB

  • Sample

    240728-2s66hszaqq

  • MD5

    c7c055ea5a4ff27236bb9c1bc562d0d9

  • SHA1

    abf36d75c3f195d2d892890d686af86f7eb39123

  • SHA256

    198a4fc5e976e2c061955169a5577900995b200c0a301f16e8334da1b8390015

  • SHA512

    30d1ca92d3c54ae22a1d702f32a698b86aff7c3174ec0557d682d34226d65ea4bbee9f834bf6a4ae788ad4135558bed90a258828b6d1f93c04b55a19b506a8e1

  • SSDEEP

    49152:hUv026HUoB0KrW85+FGRs62zcvx0pCRvmZFw5mCx1CUqBpLfQuDumXoSDLp:50tKrrEBA0oROZFw5mW1CUqBpJbDL

Malware Config

Extracted

Family

xworm

C2

147.185.221.16:60401

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

Targets

    • Target

      skrLoader .exe

    • Size

      2.5MB

    • MD5

      c7c055ea5a4ff27236bb9c1bc562d0d9

    • SHA1

      abf36d75c3f195d2d892890d686af86f7eb39123

    • SHA256

      198a4fc5e976e2c061955169a5577900995b200c0a301f16e8334da1b8390015

    • SHA512

      30d1ca92d3c54ae22a1d702f32a698b86aff7c3174ec0557d682d34226d65ea4bbee9f834bf6a4ae788ad4135558bed90a258828b6d1f93c04b55a19b506a8e1

    • SSDEEP

      49152:hUv026HUoB0KrW85+FGRs62zcvx0pCRvmZFw5mCx1CUqBpLfQuDumXoSDLp:50tKrrEBA0oROZFw5mW1CUqBpJbDL

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks