General

  • Target

    Payment Receipt.js

  • Size

    330KB

  • Sample

    240806-gmf2xs1ejk

  • MD5

    95be6aa690cfa33cf39ae04df1f71d10

  • SHA1

    c6d9a946176a7b216341387b4acfa01cba1da264

  • SHA256

    f4e2003ac6fe30a9b388badeed14ec8b9564446738c7c2313e39e476b7a4023a

  • SHA512

    8327287a6c0833d4ef5eb1b3f77c4a89a92d8b642353987af9c8c10d9f8a607d24faf2865578d6f8ceaf6f12a2d8e6571d372e41ac839487f9b6381207800e28

  • SSDEEP

    6144:9CgH7TPnDL0svfrbvfTDEkvPrLvPTzWmP/rbP/TDkEPvrLPvTzyCvfrbvfTDEkvT:T

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Extracted

Family

xworm

Version

5.0

C2

lisa22194141.duckdns.org:7000

Mutex

xyIsniB5c2bg0ZE4

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Payment Receipt.js

    • Size

      330KB

    • MD5

      95be6aa690cfa33cf39ae04df1f71d10

    • SHA1

      c6d9a946176a7b216341387b4acfa01cba1da264

    • SHA256

      f4e2003ac6fe30a9b388badeed14ec8b9564446738c7c2313e39e476b7a4023a

    • SHA512

      8327287a6c0833d4ef5eb1b3f77c4a89a92d8b642353987af9c8c10d9f8a607d24faf2865578d6f8ceaf6f12a2d8e6571d372e41ac839487f9b6381207800e28

    • SSDEEP

      6144:9CgH7TPnDL0svfrbvfTDEkvPrLvPTzWmP/rbP/TDkEPvrLPvTzyCvfrbvfTDEkvT:T

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks