General

  • Target

    Xworm V5.6.exe

  • Size

    5.3MB

  • Sample

    240911-h3pjnsyclm

  • MD5

    71319d9c7244075e18e462cdb2b642dc

  • SHA1

    59f1ef7559d6b8902f165b78812faa42732f629e

  • SHA256

    2afdd6f9d3dce3f30579c42c5391f3e822b3661d479267535a417df7513c32de

  • SHA512

    68025d708f25ebfa287d6e5c5276fd50b3f316d67788806bf104920c36618e4f431d4947e8eb80fdc9a0dc9bf4b49b35054ef8af43620c7a3f744a2a45755979

  • SSDEEP

    98304:1uF3rbJB8T+T+Zd/2fCAKBDAeYKC121GJ+YJaUARBtsklH4l1Ov:a7bHiZd/2PKBpYKkxkRBt9Hc1y

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:23016

one-mid.gl.at.ply.gg:23016

Mutex

IoMmnLuONrXyyCZg

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1246465154703560774/0XX7gYV6mBTghnI54kRnbOd7hI5OEzQSCB8dc1meM8EJEt2RkFbvlnW0D7XaBzw9i5h1

Targets

    • Target

      Xworm V5.6.exe

    • Size

      5.3MB

    • MD5

      71319d9c7244075e18e462cdb2b642dc

    • SHA1

      59f1ef7559d6b8902f165b78812faa42732f629e

    • SHA256

      2afdd6f9d3dce3f30579c42c5391f3e822b3661d479267535a417df7513c32de

    • SHA512

      68025d708f25ebfa287d6e5c5276fd50b3f316d67788806bf104920c36618e4f431d4947e8eb80fdc9a0dc9bf4b49b35054ef8af43620c7a3f744a2a45755979

    • SSDEEP

      98304:1uF3rbJB8T+T+Zd/2fCAKBDAeYKC121GJ+YJaUARBtsklH4l1Ov:a7bHiZd/2PKBpYKkxkRBt9Hc1y

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks