General
-
Target
rDoc5633276235623657_xls.exe
-
Size
84KB
-
Sample
240926-nh9xrsvapp
-
MD5
d5489da5aa14ed9d71d8338ec41a1bc1
-
SHA1
fe04a678f7d95ed31bd364e0a8a4831964f2b84f
-
SHA256
96dea95151b45309d8bda1112f842802e852a15ac2173b0023b1ba35deae5ec1
-
SHA512
68ae7b3c2367f9a2124dba4549ee90dede2fd12552acb7823eae42ffa014e7f4b37cb95b836d01de1270cbc3a48d2903988dc69d1f4f7646d39a9d0b7c77a940
-
SSDEEP
1536:WGOLl+jxSwe51ZMXEw1PfEeRH0bndlu630VDx:WGOBCtE1ZpwJbSndTEVDx
Static task
static1
Behavioral task
behavioral1
Sample
rDoc5633276235623657_xls.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
178.215.236.218:16433
OeRWZLHs1gN7FCy5
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
rDoc5633276235623657_xls.exe
-
Size
84KB
-
MD5
d5489da5aa14ed9d71d8338ec41a1bc1
-
SHA1
fe04a678f7d95ed31bd364e0a8a4831964f2b84f
-
SHA256
96dea95151b45309d8bda1112f842802e852a15ac2173b0023b1ba35deae5ec1
-
SHA512
68ae7b3c2367f9a2124dba4549ee90dede2fd12552acb7823eae42ffa014e7f4b37cb95b836d01de1270cbc3a48d2903988dc69d1f4f7646d39a9d0b7c77a940
-
SSDEEP
1536:WGOLl+jxSwe51ZMXEw1PfEeRH0bndlu630VDx:WGOBCtE1ZpwJbSndTEVDx
-
Detect Xworm Payload
-
StormKitty payload
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1