General

  • Target

    XClient..2.exe

  • Size

    38KB

  • Sample

    250104-m2nm7symek

  • MD5

    c9196dc6453467a8680afa368cb2c340

  • SHA1

    8dc19dfa55c638fb737b06bf3edaa04a6406e31f

  • SHA256

    dcd88d0f563c6164e4e55e706cb5516f957a38d08a9f91b9c1bc61586a2bd591

  • SHA512

    30b95c1f218cf918c64694a7c7bc10ee67d04ff7ced7f96592dd7e21231f35cabc976741bc1b7c639cffffb5dd7cd89f4b253487bb078e8d0c7826e04208d412

  • SSDEEP

    768:I4/CHDkUjn5fCja4sYxE7FWPA9pNGOMh0a4c:I4y4Ur5fzFJ9p4OMqZc

Malware Config

Extracted

Family

xworm

Version

5.0

C2

kit-austria.gl.at.ply.gg:59418

Mutex

KM83UkaVLVqybrWi

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient..2.exe

    • Size

      38KB

    • MD5

      c9196dc6453467a8680afa368cb2c340

    • SHA1

      8dc19dfa55c638fb737b06bf3edaa04a6406e31f

    • SHA256

      dcd88d0f563c6164e4e55e706cb5516f957a38d08a9f91b9c1bc61586a2bd591

    • SHA512

      30b95c1f218cf918c64694a7c7bc10ee67d04ff7ced7f96592dd7e21231f35cabc976741bc1b7c639cffffb5dd7cd89f4b253487bb078e8d0c7826e04208d412

    • SSDEEP

      768:I4/CHDkUjn5fCja4sYxE7FWPA9pNGOMh0a4c:I4y4Ur5fzFJ9p4OMqZc

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks