General

  • Target

    XClient.exe

  • Size

    194KB

  • Sample

    241225-1z9dsazjes

  • MD5

    5acdf267c1c641f10c87797a26384cb3

  • SHA1

    bc338127279d63df363b3576c52655875a994f7c

  • SHA256

    585afc1a328b48eb4d21af829ecf1d006867c1e634e12fb93a284876c49822fd

  • SHA512

    29f9b97cca6ecb08443216105542fabdd607671f1aea8048042fa20d5dfa7f2c895f04ba45d5823863d987b9c0fc630c2713cafafb67351910819edc320f2060

  • SSDEEP

    3072:5aMRfNYn45BIJbUo+f5eO/fqxa3v7EsUT8rmtIhW:5Lf+n4cbFKq0/HUTftO

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/YzbfPdbq

  • telegram

    https://api.telegram.org/bot7197152041:AAFBciIfecRKNs2FGtIwUCQpjjW4nxCmIQo/sendMessage?chat_id=7306315268

Targets

    • Target

      XClient.exe

    • Size

      194KB

    • MD5

      5acdf267c1c641f10c87797a26384cb3

    • SHA1

      bc338127279d63df363b3576c52655875a994f7c

    • SHA256

      585afc1a328b48eb4d21af829ecf1d006867c1e634e12fb93a284876c49822fd

    • SHA512

      29f9b97cca6ecb08443216105542fabdd607671f1aea8048042fa20d5dfa7f2c895f04ba45d5823863d987b9c0fc630c2713cafafb67351910819edc320f2060

    • SSDEEP

      3072:5aMRfNYn45BIJbUo+f5eO/fqxa3v7EsUT8rmtIhW:5Lf+n4cbFKq0/HUTftO

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks