General

  • Target

    Crypter Jynx.exe

  • Size

    1.5MB

  • Sample

    250120-avwn1stkbq

  • MD5

    d370fed0475e39de8843e54c3dfbd9d4

  • SHA1

    294f2be4a06061b11ed53946e23ae70d305eb77a

  • SHA256

    01d2705a45a1217a55c4dfd27c91d8ffe69b74088e450ac20a162fc61169fd7a

  • SHA512

    d8041e531975a0ec554446a4a918e49d9d5e502d71ae5208012f9c5b26ae2c3fb749f49a9389580d5bf549e276a3f319229cbe1bc6a8c251e73fc52387a953a2

  • SSDEEP

    24576:favnKiLNkwxE2olHKy4vUHuwN+4xeGPF17oiUFUKE+1YpW2J6BZDMdogJ6FS8:faiIXRiHj4cHi4h3U+KBWW28DMOo

Malware Config

Extracted

Family

xworm

C2

jynx.uncofig.com:1111

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      Crypter Jynx.exe

    • Size

      1.5MB

    • MD5

      d370fed0475e39de8843e54c3dfbd9d4

    • SHA1

      294f2be4a06061b11ed53946e23ae70d305eb77a

    • SHA256

      01d2705a45a1217a55c4dfd27c91d8ffe69b74088e450ac20a162fc61169fd7a

    • SHA512

      d8041e531975a0ec554446a4a918e49d9d5e502d71ae5208012f9c5b26ae2c3fb749f49a9389580d5bf549e276a3f319229cbe1bc6a8c251e73fc52387a953a2

    • SSDEEP

      24576:favnKiLNkwxE2olHKy4vUHuwN+4xeGPF17oiUFUKE+1YpW2J6BZDMdogJ6FS8:faiIXRiHj4cHi4h3U+KBWW28DMOo

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks