General
-
Target
7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d
-
Size
178KB
-
Sample
250124-dlgqaawpgx
-
MD5
718db92b63e8d468d2486f8222427c77
-
SHA1
e0d354a3159477957ff06435ecfa38bce32f1f2e
-
SHA256
7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d
-
SHA512
4f936667e6dbb0d08709ebab96829c874a9c1285d9665e23379b15047335cc3109b0aaf53e32d9df39a52ed6beecc6dc4d615c84e2add4701abd160feb1990f1
-
SSDEEP
3072:r/H9jF3sXqPXlXmbGQz1i8dOyucD1sM+lmsolAIrRuw+mqv9j1MWLQI:jHHsOmbrhwK+lDAA
Behavioral task
behavioral1
Sample
7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
198.7.115.133:7772
-
Install_directory
%AppData%
-
install_file
MSClient.exe
Targets
-
-
Target
7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d
-
Size
178KB
-
MD5
718db92b63e8d468d2486f8222427c77
-
SHA1
e0d354a3159477957ff06435ecfa38bce32f1f2e
-
SHA256
7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d
-
SHA512
4f936667e6dbb0d08709ebab96829c874a9c1285d9665e23379b15047335cc3109b0aaf53e32d9df39a52ed6beecc6dc4d615c84e2add4701abd160feb1990f1
-
SSDEEP
3072:r/H9jF3sXqPXlXmbGQz1i8dOyucD1sM+lmsolAIrRuw+mqv9j1MWLQI:jHHsOmbrhwK+lDAA
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1