General
-
Target
https://github.com/d00mt3l/XWorm-5.6
-
Sample
241027-vj1ttaxney
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/d00mt3l/XWorm-5.6
Resource
win10v2004-20241007-fr
windows10-2004-x64
32 signatures
150 seconds
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:7000
Mutex
gJf8tdwBaFufg4pc
Attributes
-
install_file
USB.exe
aes.plain
aes.plain
aes.plain
Extracted
Family
xworm
C2
127.0.0.1:7000
Attributes
-
install_file
USB.exe
Targets
-
-
Target
https://github.com/d00mt3l/XWorm-5.6
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1