General

  • Target

    7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d

  • Size

    178KB

  • Sample

    250124-dlgqaawpgx

  • MD5

    718db92b63e8d468d2486f8222427c77

  • SHA1

    e0d354a3159477957ff06435ecfa38bce32f1f2e

  • SHA256

    7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d

  • SHA512

    4f936667e6dbb0d08709ebab96829c874a9c1285d9665e23379b15047335cc3109b0aaf53e32d9df39a52ed6beecc6dc4d615c84e2add4701abd160feb1990f1

  • SSDEEP

    3072:r/H9jF3sXqPXlXmbGQz1i8dOyucD1sM+lmsolAIrRuw+mqv9j1MWLQI:jHHsOmbrhwK+lDAA

Malware Config

Extracted

Family

xworm

C2

198.7.115.133:7772

Attributes
  • Install_directory

    %AppData%

  • install_file

    MSClient.exe

Targets

    • Target

      7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d

    • Size

      178KB

    • MD5

      718db92b63e8d468d2486f8222427c77

    • SHA1

      e0d354a3159477957ff06435ecfa38bce32f1f2e

    • SHA256

      7d47a0ba9eeeb8fb9d25bc2c6acdc99408460d6d6b15957b487b3df724e9184d

    • SHA512

      4f936667e6dbb0d08709ebab96829c874a9c1285d9665e23379b15047335cc3109b0aaf53e32d9df39a52ed6beecc6dc4d615c84e2add4701abd160feb1990f1

    • SSDEEP

      3072:r/H9jF3sXqPXlXmbGQz1i8dOyucD1sM+lmsolAIrRuw+mqv9j1MWLQI:jHHsOmbrhwK+lDAA

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks