General

  • Target

    XClient.exe

  • Size

    41KB

  • Sample

    240915-1z6b5avcmh

  • MD5

    5c62d9be667e8d03c0ef82fb4b74c965

  • SHA1

    25836658f7421e5c7ad842e8a01bfaeeee1ced33

  • SHA256

    fed171984a55cc4e3a005fe373e2c28f62d81324674bbeeaba1f95db97a2c8e9

  • SHA512

    a25ddef859675a66a6452421bec9a8593dc77bfa06ac0c704fe1907ecdc903458c4f2383a29d3e3d56158a22248c3d34fe92d20ee346f42e6949cfc9d4120553

  • SSDEEP

    768:w0mrJDweBDuOkScrbsN/x6WECAr43MxfJF5Pa9p+e6iOwha3/ibR:n0DwewicrbsN/YDRrNRF49Ie6iOw0a1

Malware Config

Extracted

Family

xworm

Version

5.0

C2

category-rose.gl.at.ply.gg:36607

Mutex

MRlIn8FGfPEd7YaA

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      41KB

    • MD5

      5c62d9be667e8d03c0ef82fb4b74c965

    • SHA1

      25836658f7421e5c7ad842e8a01bfaeeee1ced33

    • SHA256

      fed171984a55cc4e3a005fe373e2c28f62d81324674bbeeaba1f95db97a2c8e9

    • SHA512

      a25ddef859675a66a6452421bec9a8593dc77bfa06ac0c704fe1907ecdc903458c4f2383a29d3e3d56158a22248c3d34fe92d20ee346f42e6949cfc9d4120553

    • SSDEEP

      768:w0mrJDweBDuOkScrbsN/x6WECAr43MxfJF5Pa9p+e6iOwha3/ibR:n0DwewicrbsN/YDRrNRF49Ie6iOw0a1

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks