General

  • Target

    Usscord.exe

  • Size

    11.3MB

  • Sample

    240923-yhqt1asgkb

  • MD5

    13cac6b9f1ce5ec5aeea1837233ec23d

  • SHA1

    318de69b0fd59664a97ab53f3be62285768fba0e

  • SHA256

    bab754f867cb6fbd79315eae753bfc572a8ec4909a650958f59772d4a5307429

  • SHA512

    db9e7990fcefc09d3332f95442a6ba1b12ed97655c0dd02c1a138e49571f81e739b4686ba95cb2d41ffac3c7ed943b40a92566e4c357d5ae59b38d328cf67026

  • SSDEEP

    196608:41O3T4BvyYP+QZkFnlreNuICsFYt+WilxwtfYkovJVrUJ66DpW:iO3ovJDZkv4uI7FYt+WiQtfY1xVYE4

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:41494

Attributes
  • Install_directory

    %AppData%

  • install_file

    system.exe

Targets

    • Target

      Usscord.exe

    • Size

      11.3MB

    • MD5

      13cac6b9f1ce5ec5aeea1837233ec23d

    • SHA1

      318de69b0fd59664a97ab53f3be62285768fba0e

    • SHA256

      bab754f867cb6fbd79315eae753bfc572a8ec4909a650958f59772d4a5307429

    • SHA512

      db9e7990fcefc09d3332f95442a6ba1b12ed97655c0dd02c1a138e49571f81e739b4686ba95cb2d41ffac3c7ed943b40a92566e4c357d5ae59b38d328cf67026

    • SSDEEP

      196608:41O3T4BvyYP+QZkFnlreNuICsFYt+WilxwtfYkovJVrUJ66DpW:iO3ovJDZkv4uI7FYt+WiQtfY1xVYE4

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks