General

  • Target

    XClient111.exe

  • Size

    75KB

  • Sample

    241204-xbggba1khk

  • MD5

    1c7d67e357a4c6f86fde169b8fa74639

  • SHA1

    4168ae0daa5e17cd0928c7542e49bde8490acdb9

  • SHA256

    4094fea68e7a41431fe15eaf1ebbf4d88d20c10e01d4c32e4b466757e626964f

  • SHA512

    a9b87f16bd144568182d2f2dc19855d57be54b73f3066cbfc299f6132b41cd2cd49fdd4d2921d2dedf17b05f5a244c9b41dc8ff500140cbe760e11daf9038205

  • SSDEEP

    1536:9zpyggc1VrFL5n1yubpKAXcbK8ni9o26XvmOpqKnKE1J:9lEaFVn1zbzsbKh9oPvmOIiJ

Malware Config

Extracted

Family

xworm

C2

5.166.171.54:5552

Attributes
  • Install_directory

    %Temp%

  • install_file

    CelestialUpdate.exe

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      XClient111.exe

    • Size

      75KB

    • MD5

      1c7d67e357a4c6f86fde169b8fa74639

    • SHA1

      4168ae0daa5e17cd0928c7542e49bde8490acdb9

    • SHA256

      4094fea68e7a41431fe15eaf1ebbf4d88d20c10e01d4c32e4b466757e626964f

    • SHA512

      a9b87f16bd144568182d2f2dc19855d57be54b73f3066cbfc299f6132b41cd2cd49fdd4d2921d2dedf17b05f5a244c9b41dc8ff500140cbe760e11daf9038205

    • SSDEEP

      1536:9zpyggc1VrFL5n1yubpKAXcbK8ni9o26XvmOpqKnKE1J:9lEaFVn1zbzsbKh9oPvmOIiJ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks