General

  • Target

    CeleryInstaller.exe

  • Size

    822KB

  • Sample

    240815-fsewda1dmp

  • MD5

    5ce16788ba0245d5e0525600bc840303

  • SHA1

    7a05b8b1f7d3e4a1ed2970ee264f8e30f7583fad

  • SHA256

    a906de7e59caa3642f04482c23be09a43b17d4c90c3f2d2459dec6f9231e0785

  • SHA512

    52154622f238f269ffc9dd129ba92741fc295db2cf0d11ccdbd022d05a6bbf3ddf4034897bc6223d837d9f9c9db2307165919d5a1f5cbf3d9f9d00daa4c123c6

  • SSDEEP

    24576:6Zxdyl5wgQxPjs8kKMpoim6Gat+R3plhxZiXQu0Z:0Ul5wgQ9s8EpIa2xZn

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

bE1HzVhYuINX4Uqh

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    Windows Host Proccess.exe

  • pastebin_url

    https://pastebin.com/raw/fqZCUyFU

aes.plain

Targets

    • Target

      CeleryInstaller.exe

    • Size

      822KB

    • MD5

      5ce16788ba0245d5e0525600bc840303

    • SHA1

      7a05b8b1f7d3e4a1ed2970ee264f8e30f7583fad

    • SHA256

      a906de7e59caa3642f04482c23be09a43b17d4c90c3f2d2459dec6f9231e0785

    • SHA512

      52154622f238f269ffc9dd129ba92741fc295db2cf0d11ccdbd022d05a6bbf3ddf4034897bc6223d837d9f9c9db2307165919d5a1f5cbf3d9f9d00daa4c123c6

    • SSDEEP

      24576:6Zxdyl5wgQxPjs8kKMpoim6Gat+R3plhxZiXQu0Z:0Ul5wgQ9s8EpIa2xZn

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks