General

  • Target

    9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982

  • Size

    1.9MB

  • Sample

    241205-lwebxavnhk

  • MD5

    0fa0f690b52cbae6bc8ebbe14f3c3e18

  • SHA1

    9ddef8fe6dd6ebb967d2013d8f922da6bd7f32a7

  • SHA256

    9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982

  • SHA512

    72a7868f4c9febb29e9cd58669d71840d01066120134dff18536e3049d1ed2b72449a871ac63f838f2dd8d98ad43568a2b54a4669d2ff4f821f346547eff5b82

  • SSDEEP

    49152:1cAik7bXfOK/h8ouCv7NNKD19hCi1aD8K95Zvwe:aABvOK/hzNNMkOaD8KtZ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

vpss.ddns.net:1245

indic.serveftp.com:1245

Mutex

ZlxMvmg7wbh8VVle

Attributes
  • Install_directory

    %AppData%

  • install_file

    Process for Setting Synchronization .exe

  • telegram

    https://api.telegram.org/bot6089519915:AAF7fGsNdxVbpoG7s96nf2ioIN27LQpQuh8/sendMessage?chat_id=597592591

aes.plain

Targets

    • Target

      9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982

    • Size

      1.9MB

    • MD5

      0fa0f690b52cbae6bc8ebbe14f3c3e18

    • SHA1

      9ddef8fe6dd6ebb967d2013d8f922da6bd7f32a7

    • SHA256

      9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982

    • SHA512

      72a7868f4c9febb29e9cd58669d71840d01066120134dff18536e3049d1ed2b72449a871ac63f838f2dd8d98ad43568a2b54a4669d2ff4f821f346547eff5b82

    • SSDEEP

      49152:1cAik7bXfOK/h8ouCv7NNKD19hCi1aD8K95Zvwe:aABvOK/hzNNMkOaD8KtZ

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks