General

  • Target

    c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168.js

  • Size

    328KB

  • Sample

    240809-b1dwtsxhqa

  • MD5

    6837307ec45d904b112be679217c4753

  • SHA1

    10e00ce374f8ebb3e54f6d26d99e8db6a6383e15

  • SHA256

    c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168

  • SHA512

    32087813f7826c052415592313a77a362033133034f0ad055480f063c4aa5d1de3da2e4bb38919da67f0f13e984d71f66c52455ed254634825f453f964717ef5

  • SSDEEP

    6144:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkU1FxB1F5J2WlFhBlFpJAw1FRh1FZp2Wl6:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkl

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Extracted

Family

xworm

Version

5.0

C2

lisa22194141.duckdns.org:7000

Mutex

x8iJFYABjI83VZm2

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168.js

    • Size

      328KB

    • MD5

      6837307ec45d904b112be679217c4753

    • SHA1

      10e00ce374f8ebb3e54f6d26d99e8db6a6383e15

    • SHA256

      c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168

    • SHA512

      32087813f7826c052415592313a77a362033133034f0ad055480f063c4aa5d1de3da2e4bb38919da67f0f13e984d71f66c52455ed254634825f453f964717ef5

    • SSDEEP

      6144:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkU1FxB1F5J2WlFhBlFpJAw1FRh1FZp2Wl6:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkl

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks