General

  • Target

    XCliaent.exe

  • Size

    80KB

  • Sample

    240914-p5fg4svfjh

  • MD5

    84ef912e583e2085324aff1b1838ea02

  • SHA1

    4cf9e83bb995c40e1b509090c2523954b19b31f4

  • SHA256

    8ba3b9263bbf0baf8b955e53272b90dca4c7525fd42d1368386aa95ec71a434a

  • SHA512

    b0b9fa353f413f1215bb8d49546a5914e80e96aacdc675c085371ea9f6797e332b77655f96abb99fff4105020f12f32a8b8ad36078a0f68de65bdb724995e56b

  • SSDEEP

    1536:90YS2Xy3ynngKG6H08Dd7Kb2uFUMgNG6O6U9aOynP83yFzr2Hi+:90t2C3UhGwv7KbjF5GG60aOcEiFkX

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:46682

127.0.0.1:46682

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

Targets

    • Target

      XCliaent.exe

    • Size

      80KB

    • MD5

      84ef912e583e2085324aff1b1838ea02

    • SHA1

      4cf9e83bb995c40e1b509090c2523954b19b31f4

    • SHA256

      8ba3b9263bbf0baf8b955e53272b90dca4c7525fd42d1368386aa95ec71a434a

    • SHA512

      b0b9fa353f413f1215bb8d49546a5914e80e96aacdc675c085371ea9f6797e332b77655f96abb99fff4105020f12f32a8b8ad36078a0f68de65bdb724995e56b

    • SSDEEP

      1536:90YS2Xy3ynngKG6H08Dd7Kb2uFUMgNG6O6U9aOynP83yFzr2Hi+:90t2C3UhGwv7KbjF5GG60aOcEiFkX

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks