Resubmissions

13-01-2025 01:00

250113-bcnq5axqbt 10

09-01-2025 12:16

250109-pfhwyazjhs 10

06-01-2025 14:21

250106-rpb6vs1kgr 10

02-01-2025 20:47

250102-zlagvsvpdv 10

02-01-2025 20:45

250102-zjvd9ayjar 10

General

  • Target

    Firefox Installer (ratted).exe

  • Size

    170KB

  • Sample

    250109-pfhwyazjhs

  • MD5

    200eb10c73336127006740ae06003933

  • SHA1

    32ef06528018d4f9fc8da3a7e7e07363b3a143f4

  • SHA256

    b46624ea261bec807dc1f93431ab3156450646976443c27322a7a9c4eec5e5f0

  • SHA512

    026eb0e018f25449f664dbc2655cfb5c360fd60a928fec344bd31b3cefa01a3fcce4dd1fc87b3aabce7557db57cb1247a1984c69b3ecb00d83f388fd6b09a0ce

  • SSDEEP

    1536:4ig4nFL9z2BOwVCMs6se7llqn17KineXd2wVKtivEYoNRh8RX9EIKhI49No:5zFL9zWOw7sgbcUieNJqKoPC5+Lm

Malware Config

Extracted

Family

xworm

Version

5.0

C2

109.231.31.129:2021

Mutex

H7HNKbba3h7eEPOa

Attributes
  • Install_directory

    %AppData%

  • install_file

    FlrefoxUpdate.exe

aes.plain

Targets

    • Target

      Firefox Installer (ratted).exe

    • Size

      170KB

    • MD5

      200eb10c73336127006740ae06003933

    • SHA1

      32ef06528018d4f9fc8da3a7e7e07363b3a143f4

    • SHA256

      b46624ea261bec807dc1f93431ab3156450646976443c27322a7a9c4eec5e5f0

    • SHA512

      026eb0e018f25449f664dbc2655cfb5c360fd60a928fec344bd31b3cefa01a3fcce4dd1fc87b3aabce7557db57cb1247a1984c69b3ecb00d83f388fd6b09a0ce

    • SSDEEP

      1536:4ig4nFL9z2BOwVCMs6se7llqn17KineXd2wVKtivEYoNRh8RX9EIKhI49No:5zFL9zWOw7sgbcUieNJqKoPC5+Lm

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks