General

  • Target

    Playit.gg.exe

  • Size

    41KB

  • Sample

    240916-1emz2s1bqp

  • MD5

    e462d14323ba8c46b3c49c6f0a47a28a

  • SHA1

    28812e5914ffba4cd87a2394e9fe1ce41b5384be

  • SHA256

    3ba9770b83cd3c91ab3a959acb7deefc9bd5af4bc90ae46f3be32412d0de7e7a

  • SHA512

    1bb75204a33e91e1375490707e0de44758b558eca260999f8b4f53c8748593752efbfd28fceaaf1b0d92caf7b6e886c4ba10aeffff7fab9524510f3464b9b610

  • SSDEEP

    768:hmrJDweBDuOkScrbsN/x6eqCAr43MxfJF5Pa9p+gt6iOwhi3/ibl:h0DwewicrbsN/YVRrNRF49Igt6iOw8ax

Malware Config

Extracted

Family

xworm

Version

5.0

C2

category-rose.gl.at.ply.gg:36607

Mutex

0vUq2IOz4vEduQhF

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Playit.gg.exe

    • Size

      41KB

    • MD5

      e462d14323ba8c46b3c49c6f0a47a28a

    • SHA1

      28812e5914ffba4cd87a2394e9fe1ce41b5384be

    • SHA256

      3ba9770b83cd3c91ab3a959acb7deefc9bd5af4bc90ae46f3be32412d0de7e7a

    • SHA512

      1bb75204a33e91e1375490707e0de44758b558eca260999f8b4f53c8748593752efbfd28fceaaf1b0d92caf7b6e886c4ba10aeffff7fab9524510f3464b9b610

    • SSDEEP

      768:hmrJDweBDuOkScrbsN/x6eqCAr43MxfJF5Pa9p+gt6iOwhi3/ibl:h0DwewicrbsN/YVRrNRF49Igt6iOw8ax

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables RegEdit via registry modification

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks