General

  • Target

    MenuV2.exe

  • Size

    748KB

  • Sample

    240823-qpbpnawerb

  • MD5

    5f0d461210ca6dba34f3fa4adb952ac8

  • SHA1

    21f2a762cc0205043a22bfafbb203f9ac82c6ef0

  • SHA256

    b25eb7be7027a8a28d06a9c1fbea75d43116111bbaed3aa0d549b6d3ac90bab4

  • SHA512

    6efc85babe5a304c5c815cc320880d10f3657dd7e78aea9c0bf10daa80c81b95e7f7627f0f4d3a8028ca25f914abae7547999fc333596849808115ea8dcdf2d8

  • SSDEEP

    12288:kc5K8fRXOGtBupFYRoKYOEvyPtG3LG7ghRhJX2OaGnn+jTFd/4ZzoSOpwT37MMp:R1OaBMAtPEvy1qLwgDhJXdnakznOpwT6

Malware Config

Extracted

Family

xworm

C2

foranother1337.publicvm.com:55554

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    chrome.exe

Targets

    • Target

      MenuV2.exe

    • Size

      748KB

    • MD5

      5f0d461210ca6dba34f3fa4adb952ac8

    • SHA1

      21f2a762cc0205043a22bfafbb203f9ac82c6ef0

    • SHA256

      b25eb7be7027a8a28d06a9c1fbea75d43116111bbaed3aa0d549b6d3ac90bab4

    • SHA512

      6efc85babe5a304c5c815cc320880d10f3657dd7e78aea9c0bf10daa80c81b95e7f7627f0f4d3a8028ca25f914abae7547999fc333596849808115ea8dcdf2d8

    • SSDEEP

      12288:kc5K8fRXOGtBupFYRoKYOEvyPtG3LG7ghRhJX2OaGnn+jTFd/4ZzoSOpwT37MMp:R1OaBMAtPEvy1qLwgDhJXdnakznOpwT6

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks