General

  • Target

    ORDER-24930-067548.tar

  • Size

    728B

  • Sample

    241002-p1sa4swhjn

  • MD5

    d69efcae7b8c84891f2a97704056d359

  • SHA1

    61ea98957f4f58f99eac93dd1ba6eb6167bf1b14

  • SHA256

    2d11b150e60197726edad9fc6b6b9c1c4f4aad396ddcb0fed1f3fd85d585345b

  • SHA512

    2a046513f9bcfd53b7479433a51624ac2aa8c152898d36eda78d87b4a9c7569b3e0674e7d88be4c908f9b4f1d7bd972af9fa4266fead6c4ed95838740e06084b

Malware Config

Extracted

Family

xworm

Version

5.0

C2

as525795.duckdns.org:6980

194.37.97.150:6980

Mutex

wtYmVE2WY2XGhWlO

Attributes
  • install_file

    adobe.exe

aes.plain

Targets

    • Target

      ORDER-24930-067548.js

    • Size

      7KB

    • MD5

      8fbf57ab035ec7063b9522e5f30a75f7

    • SHA1

      cd761463221ba82f46b2b28fe56a0e74588c64b9

    • SHA256

      ff84d777db298c70e206a94f1a4a1a5d5536d8cd42eedbd50ffde364daa368a6

    • SHA512

      6fb68c7241c130973c1332a2f1c23c76cdb4640d76e270e1a0538a83001fe7d2aa4397ccb34def80ce88a5050f36d7bbaad7700fd9efa666c26bb0e6c4bc71d6

    • SSDEEP

      96:lUu0CRu5u37arzWruLprCRuzrN+uQ6rgxX4murNdgCRufZQL76mXHNuipdWwp5i6:lUycqnDtjfQxaWpK+l

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks