General

  • Target

    4556-6-0x0000000005AE0000-0x0000000005AEE000-memory.dmp

  • Size

    56KB

  • Sample

    240820-s5zgrstgmq

  • MD5

    4ddbbe456e30688cee432026609b8827

  • SHA1

    a16545ba3e14bcfee49c3099424e79c62ab7de90

  • SHA256

    48a965d12180f711f3faac37459576d9dd353c74a9b173debf2c24a760fd6937

  • SHA512

    e35155e1a4bb274152b805d967087af6461c866a121baa6638ef0faca53c8a197490e6530cc502247f087f53f192bb72b94db5371d4b1a6e22bbd6d325522e71

  • SSDEEP

    384:1EbmX5Qa+vN1h1+X3v6JFjL+g93Tm2eaFOkOdRApkFTBLTsOZwpGd2v99Ikuislj:mVa+vNtg+PB93Tw4dOdVFE9j4OjhGbP

Malware Config

Extracted

Family

xworm

Version

5.0

C2

192.3.101.172:7000

Mutex

NaDGFqrxW3KfaOw9

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      4556-6-0x0000000005AE0000-0x0000000005AEE000-memory.dmp

    • Size

      56KB

    • MD5

      4ddbbe456e30688cee432026609b8827

    • SHA1

      a16545ba3e14bcfee49c3099424e79c62ab7de90

    • SHA256

      48a965d12180f711f3faac37459576d9dd353c74a9b173debf2c24a760fd6937

    • SHA512

      e35155e1a4bb274152b805d967087af6461c866a121baa6638ef0faca53c8a197490e6530cc502247f087f53f192bb72b94db5371d4b1a6e22bbd6d325522e71

    • SSDEEP

      384:1EbmX5Qa+vN1h1+X3v6JFjL+g93Tm2eaFOkOdRApkFTBLTsOZwpGd2v99Ikuislj:mVa+vNtg+PB93Tw4dOdVFE9j4OjhGbP

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks