General
-
Target
XWorm V5.6.zip
-
Size
24.5MB
-
Sample
241111-wk5ptstamb
-
MD5
27065dd8016564f65a5444d70a9daad1
-
SHA1
1be1151330b7b0f12c486e9e36a1fa682adcac50
-
SHA256
7c62a831647b0234a097ff94b160e0534d7c465d7bbd6fca8953c951a55157cf
-
SHA512
fcf41ba034133fcb7f91936fb16a6b59503a9016a78079c61fd692edec24a7e3daadf8ae2459d36ecd6c72dff9f8835355ea8cc7d20455d3e0922d74f7337435
-
SSDEEP
393216:VyavqxXFeuBc9Q+Fdt6ieJS9xCZGb7kjjJ6AKbKrbdcjXo50Ko+Y2ToxYv:Vy5xXDBYQwn63qkjBKego5Ho+R
Behavioral task
behavioral1
Sample
XWorm V5.6.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm V5.6.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
npCjKGoBzBFLsWVA
-
install_file
USB.exe
Targets
-
-
Target
XWorm V5.6.zip
-
Size
24.5MB
-
MD5
27065dd8016564f65a5444d70a9daad1
-
SHA1
1be1151330b7b0f12c486e9e36a1fa682adcac50
-
SHA256
7c62a831647b0234a097ff94b160e0534d7c465d7bbd6fca8953c951a55157cf
-
SHA512
fcf41ba034133fcb7f91936fb16a6b59503a9016a78079c61fd692edec24a7e3daadf8ae2459d36ecd6c72dff9f8835355ea8cc7d20455d3e0922d74f7337435
-
SSDEEP
393216:VyavqxXFeuBc9Q+Fdt6ieJS9xCZGb7kjjJ6AKbKrbdcjXo50Ko+Y2ToxYv:Vy5xXDBYQwn63qkjBKego5Ho+R
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2