General

  • Target

    XClient2.exe

  • Size

    82KB

  • Sample

    240805-vtvqjswgjb

  • MD5

    04bfb56e7cfe27e2fb1dc4be72b705f5

  • SHA1

    324e46eb02a4561536d9f5775e84592b85fd0f22

  • SHA256

    6b0c02766fe5cce2ba045b22a4d22e1be715f36de87bcf37aef6819c9c2acc6d

  • SHA512

    c80df99774f899f48b0150a32b86ba7c60337c99bbe6f60f57c8a7963fb50ce7c2259dd171353257abe21bce94e2ed33b2860ba60e0cc677519defc4e08e2015

  • SSDEEP

    1536:cajDKkkG+Ng/rhqNGqdQAbmnGTDxE6S+Fj1ypOFEgLAMB/ddK:Rd1+ejloQAbmGTtypOKuBDK

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:48534

localhost:48534

domain-vote.gl.at.ply.gg:48534

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XClient2.exe

    • Size

      82KB

    • MD5

      04bfb56e7cfe27e2fb1dc4be72b705f5

    • SHA1

      324e46eb02a4561536d9f5775e84592b85fd0f22

    • SHA256

      6b0c02766fe5cce2ba045b22a4d22e1be715f36de87bcf37aef6819c9c2acc6d

    • SHA512

      c80df99774f899f48b0150a32b86ba7c60337c99bbe6f60f57c8a7963fb50ce7c2259dd171353257abe21bce94e2ed33b2860ba60e0cc677519defc4e08e2015

    • SSDEEP

      1536:cajDKkkG+Ng/rhqNGqdQAbmnGTDxE6S+Fj1ypOFEgLAMB/ddK:Rd1+ejloQAbmGTtypOKuBDK

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks