General

  • Target

    XWorm V5.2.exe

  • Size

    37.7MB

  • Sample

    240909-tawcaswfjp

  • MD5

    4d2fe88411ca382a705f7de70505f8ee

  • SHA1

    992be069e1123ea68a414ce462f2b7a0e5c39563

  • SHA256

    1180b5ce40dfeadc5843448e0f163408aa33f23abe39030d5eecaf37fc17d551

  • SHA512

    8df4399dc43b854fd72764b426146044799aaea80a07dbecf4d28941b957af1b480ade452fd020912c37b54280a057f02be19c10812f59ab3b8f2d45c0a82b43

  • SSDEEP

    786432:V3on1HvSzxAMNwFZArYsHPv697OZYV797:VYn1HvSpNwXmvYJX

Malware Config

Targets

    • Target

      XWorm V5.2.exe

    • Size

      37.7MB

    • MD5

      4d2fe88411ca382a705f7de70505f8ee

    • SHA1

      992be069e1123ea68a414ce462f2b7a0e5c39563

    • SHA256

      1180b5ce40dfeadc5843448e0f163408aa33f23abe39030d5eecaf37fc17d551

    • SHA512

      8df4399dc43b854fd72764b426146044799aaea80a07dbecf4d28941b957af1b480ade452fd020912c37b54280a057f02be19c10812f59ab3b8f2d45c0a82b43

    • SSDEEP

      786432:V3on1HvSzxAMNwFZArYsHPv697OZYV797:VYn1HvSpNwXmvYJX

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks