General
-
Target
@Cybnux_XWorm_v5.6_Cracker.rar
-
Size
19.7MB
-
Sample
241024-swc76s1clh
-
MD5
0b87bf0a97079e39453d580707339f8d
-
SHA1
e6cc2b04766f9942c90caba2046bfbd936210d2b
-
SHA256
17ff9f594f93a70b84c110c94e0341d2385260642e4f036cf2fda381c66be4ba
-
SHA512
514c4ee3c37e4f1d92e8ba980c1d64cfd8b2bcb4b5daecffa527bd43850a9bac737e362244bda78970b3d044bca51ebc9ad95bfc868a9808dd44c965913ca2bb
-
SSDEEP
393216:rya9e39neJPF6z48TCtSTNzFpatK/GGQLmHbOoe47Q3pOHT3DEu8tlI:ry33USlWANzv85y7Jeh3kbsC
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
BvnN4Uiu1lHu4rUW
-
install_file
USB.exe
Extracted
xworm
127.0.0.1:7000
-
install_file
USB.exe
Targets
-
-
Target
@Cybnux_XWorm_v5.6_Cracker.rar
-
Size
19.7MB
-
MD5
0b87bf0a97079e39453d580707339f8d
-
SHA1
e6cc2b04766f9942c90caba2046bfbd936210d2b
-
SHA256
17ff9f594f93a70b84c110c94e0341d2385260642e4f036cf2fda381c66be4ba
-
SHA512
514c4ee3c37e4f1d92e8ba980c1d64cfd8b2bcb4b5daecffa527bd43850a9bac737e362244bda78970b3d044bca51ebc9ad95bfc868a9808dd44c965913ca2bb
-
SSDEEP
393216:rya9e39neJPF6z48TCtSTNzFpatK/GGQLmHbOoe47Q3pOHT3DEu8tlI:ry33USlWANzv85y7Jeh3kbsC
-
Detect Xworm Payload
-
StormKitty payload
-
Download via BitsAdmin
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1