General
-
Target
XWorm-5.6-main.zip
-
Size
25.1MB
-
Sample
241017-ae5a8avalj
-
MD5
95c1c4a3673071e05814af8b2a138be4
-
SHA1
4c08b79195e0ff13b63cfb0e815a09dc426ac340
-
SHA256
7c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27
-
SHA512
339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd
-
SSDEEP
786432:Ty5jMDNnx2+4NYobtH8VVtKqi9+i514XZ/pjYlp0:MMDNnxV4iobxibiIi5MpjYv0
Behavioral task
behavioral1
Sample
XWorm-5.6-main/Fixer.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main/Plugins/Options.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/RES/XWorm.Resources.vbs
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/Xworm V5.6.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:8888
maoR2mXoJbzjTaPs
-
install_file
USB.exe
Extracted
lumma
https://pillowbrocccolipe.shop/api
https://communicationgenerwo.shop/api
https://diskretainvigorousiw.shop/api
https://affordcharmcropwo.shop/api
https://dismissalcylinderhostw.shop/api
https://enthusiasimtitleow.shop/api
https://worryfillvolcawoi.shop/api
https://cleartotalfisherwo.shop/api
Targets
-
-
Target
XWorm-5.6-main/Fixer.bat
-
Size
122B
-
MD5
2dabc46ce85aaff29f22cd74ec074f86
-
SHA1
208ae3e48d67b94cc8be7bbfd9341d373fa8a730
-
SHA256
a11703fd47d16020fa099a95bb4e46247d32cf8821dc1826e77a971cdd3c4c55
-
SHA512
6a50b525bc5d8eb008b1b0d704f9942f72f1413e65751e3de83d2e16ef3cf02ef171b9da3fff0d2d92a81daac7f61b379fcf7a393f46e914435f6261965a53b3
Score5/10-
Drops file in System32 directory
-
-
-
Target
XWorm-5.6-main/Plugins/Options.dll
-
Size
30KB
-
MD5
97193fc4c016c228ae0535772a01051d
-
SHA1
f2f6d56d468329b1e9a91a3503376e4a6a4d5541
-
SHA256
5c34aee5196e0f8615b8d1d9017dd710ea28d2b7ac99295d46046d12eea58d78
-
SHA512
9f6d7da779e8c9d7307f716d4a4453982bb7f090c35947850f13ec3c9472f058fc11e1120a9641326970b9846d3c691e0c2afd430c12e5e8f30abadb5dcf5ed2
-
SSDEEP
768:ULxkuz7dDWH839iybgkf/sGRNW9S9dhjcI:ULNHqUPbgQsGRNW9S9
Score1/10 -
-
-
Target
XWorm-5.6-main/RES/XWorm.Resources.resources
-
Size
1.6MB
-
MD5
34986e38b463873af40f694874c1f6d3
-
SHA1
8fa89cdb7a394cf8093d548ca9db4652c703ee72
-
SHA256
557058bd29a5eb55ef073ea9c4dec0baea1fd3f3f4bf2cdd5ee3dfd33735e93a
-
SHA512
c1b0278e8c21e5c28204f692a5cf5ed16c8ada0c6022d7d38e70905255f3aeb5d2c0fd4549f0ed19ead52aa0ced891a8f9372123bf5e1710be004958750874e4
-
SSDEEP
49152:OsP2WTJcLsk9Pk6gAK6BN2NQUe+ErnuVqjNhHXH:zuWTGLP9Pk6gAK6n4ldyNh3
Score1/10 -
-
-
Target
XWorm-5.6-main/Xworm V5.6.exe
-
Size
14.9MB
-
MD5
56ccb739926a725e78a7acf9af52c4bb
-
SHA1
5b01b90137871c3c8f0d04f510c4d56b23932cbc
-
SHA256
90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
-
SHA512
2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
SSDEEP
196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i
-
Detect Xworm Payload
-
StormKitty payload
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
-
-
Target
XWorm-5.6-main/XwormLoader.exe
-
Size
490KB
-
MD5
9c9245810bad661af3d6efec543d34fd
-
SHA1
93e4f301156d120a87fe2c4be3aaa28b9dfd1a8d
-
SHA256
f5f14b9073f86da926a8ed319b3289b893442414d1511e45177f6915fb4e5478
-
SHA512
90d9593595511e722b733a13c53d2e69a1adc9c79b3349350deead2c1cdfed615921fb503597950070e9055f6df74bb64ccd94a60d7716822aa632699c70b767
-
SSDEEP
6144:3PkcFUUUQHs5TlOhDuy4VjmSO6/tU4j06xeJyCjvhsXZ4m05d0qCsfBLuWWCV/rr:3McWUUysz/NhKjJPhM4/5bV/rvgE3
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1