General

  • Target

    rstxdhuj.exe

  • Size

    963KB

  • Sample

    241015-evl7ssthlh

  • MD5

    1ef39c8bc5799aa381fe093a1f2d532a

  • SHA1

    57eabb02a7c43c9682988227dd470734cc75edb2

  • SHA256

    0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4

  • SHA512

    13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682

  • SSDEEP

    24576:6MGVJ/Oap+Bh45LEwaV1QghDHm5GQTSmGg:6NJ/jpi5waVhjm5GQ2m7

Malware Config

Extracted

Family

xworm

Version

5.0

C2

188.190.10.161:4444

Mutex

TSXTkO0pNBdN2KNw

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      rstxdhuj.exe

    • Size

      963KB

    • MD5

      1ef39c8bc5799aa381fe093a1f2d532a

    • SHA1

      57eabb02a7c43c9682988227dd470734cc75edb2

    • SHA256

      0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4

    • SHA512

      13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682

    • SSDEEP

      24576:6MGVJ/Oap+Bh45LEwaV1QghDHm5GQTSmGg:6NJ/jpi5waVhjm5GQ2m7

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks