General

  • Target

    User Password.txt

  • Size

    49KB

  • Sample

    250127-w7glhs1kfv

  • MD5

    9cda258445b322eb90f65b32ba86d86c

  • SHA1

    d86a39dcc80db9cef23fc389dbbb6951ed7f908c

  • SHA256

    0aca70f4574b4f593ad118de1846cb744eed48473a8fd51759c37e508d44e50f

  • SHA512

    f76c77b63b6e881cd6e9a436b5efe5e4a45a8e78126fcc6876ec6855ef2572ba7e9dec7200e32ddca78f232d451305f87729ee5989f3c8ed83cde53d132a1d9a

  • SSDEEP

    768:DaT5ryS4lEW64POSn1iQK4kb2UULNwLdVvM6wEO1hEjdoHj:GNrH+EWR5rkbzeNivM6wEO1yaj

Malware Config

Extracted

Family

xworm

C2

sponef159-35748.portmap.host:35748

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7508868671:AAG6XIOhz39IrQIUnjub1TKVOVZHfdjpsvM/sendMessage?chat_id=6094400048

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7508868671:AAG6XIOhz39IrQIUnjub1TKVOVZHfdjpsvM/sendMessage?chat_id=6094400048

Targets

    • Target

      User Password.txt

    • Size

      49KB

    • MD5

      9cda258445b322eb90f65b32ba86d86c

    • SHA1

      d86a39dcc80db9cef23fc389dbbb6951ed7f908c

    • SHA256

      0aca70f4574b4f593ad118de1846cb744eed48473a8fd51759c37e508d44e50f

    • SHA512

      f76c77b63b6e881cd6e9a436b5efe5e4a45a8e78126fcc6876ec6855ef2572ba7e9dec7200e32ddca78f232d451305f87729ee5989f3c8ed83cde53d132a1d9a

    • SSDEEP

      768:DaT5ryS4lEW64POSn1iQK4kb2UULNwLdVvM6wEO1hEjdoHj:GNrH+EWR5rkbzeNivM6wEO1yaj

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks