General

  • Target

    1abb33b881408b0341a530de14b0afdb88b96ffcd0254dd397848db3e6508803

  • Size

    1.3MB

  • Sample

    241105-yyp8eaycnr

  • MD5

    a4c1ea4b6e69e69462efa7659ff6f48c

  • SHA1

    cf71024bf28f10f63bf7cd27dba64d406c2ed97c

  • SHA256

    1abb33b881408b0341a530de14b0afdb88b96ffcd0254dd397848db3e6508803

  • SHA512

    be527013711f308bb9a0deb65b11066570e86cee896041d55556dc8566a2476bc96ab089ca155030397d95fd8d358170bc2f5b0bf97efd579dd464b1ca803507

  • SSDEEP

    24576:/84F/cDq4sTq+gdI2W+7nMS9LJf4bcwGCYVgERFh7IfEx0ECnaf:kEcyjgmkMS9L2cFCER0f+0ECna

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8895

162.230.48.189:8895

Mutex

ZRGtN7NDh24Vx89x

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      1abb33b881408b0341a530de14b0afdb88b96ffcd0254dd397848db3e6508803

    • Size

      1.3MB

    • MD5

      a4c1ea4b6e69e69462efa7659ff6f48c

    • SHA1

      cf71024bf28f10f63bf7cd27dba64d406c2ed97c

    • SHA256

      1abb33b881408b0341a530de14b0afdb88b96ffcd0254dd397848db3e6508803

    • SHA512

      be527013711f308bb9a0deb65b11066570e86cee896041d55556dc8566a2476bc96ab089ca155030397d95fd8d358170bc2f5b0bf97efd579dd464b1ca803507

    • SSDEEP

      24576:/84F/cDq4sTq+gdI2W+7nMS9LJf4bcwGCYVgERFh7IfEx0ECnaf:kEcyjgmkMS9L2cFCER0f+0ECna

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks