General

  • Target

    f7012ceb3f5f17167f1b0eb83dc97b3064ea92dc81d1151a2218112895142afd.js

  • Size

    329KB

  • Sample

    240808-cbkthssaja

  • MD5

    b4105714b83cef4f0d8d859364cd6322

  • SHA1

    448f53b0c979beb7305db50a282bef00043e6840

  • SHA256

    f7012ceb3f5f17167f1b0eb83dc97b3064ea92dc81d1151a2218112895142afd

  • SHA512

    91a19c5e098351e053de13d4c8ebe3677f2fec4aac7a63169a30ea147c75b0ce734e11011724ff6d7be7e7b2311ce9663ef9b6c52f2172febaca2c2f7cb03f0a

  • SSDEEP

    768:P7rCumqiWTinPK6eOK6mW3XKqe+KqmG9NqaeOqamWX3qKuH+qKmGxBK6eOK6mW3G:rdvJ5strohpUtg1vx

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Extracted

Family

xworm

Version

5.0

C2

christyrusike21.duckdns.org:7000

Mutex

znkTtudE0WUuGVBW

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      f7012ceb3f5f17167f1b0eb83dc97b3064ea92dc81d1151a2218112895142afd.js

    • Size

      329KB

    • MD5

      b4105714b83cef4f0d8d859364cd6322

    • SHA1

      448f53b0c979beb7305db50a282bef00043e6840

    • SHA256

      f7012ceb3f5f17167f1b0eb83dc97b3064ea92dc81d1151a2218112895142afd

    • SHA512

      91a19c5e098351e053de13d4c8ebe3677f2fec4aac7a63169a30ea147c75b0ce734e11011724ff6d7be7e7b2311ce9663ef9b6c52f2172febaca2c2f7cb03f0a

    • SSDEEP

      768:P7rCumqiWTinPK6eOK6mW3XKqe+KqmG9NqaeOqamWX3qKuH+qKmGxBK6eOK6mW3G:rdvJ5strohpUtg1vx

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks