General
-
Target
CookieScript.exe
-
Size
70KB
-
Sample
250210-p9419ssmbn
-
MD5
db991a8bbad955983d68121fea62aa1a
-
SHA1
d103e2def0fb83b53edc95e81eb4e7e7a33f46f9
-
SHA256
b47e2ebd5df87d6fe2b540f94aa188eae6f45f0df94815c35d4f2a9e4db08f38
-
SHA512
f2a60a290c5079e559d8e1d3210822a1a8f01d6d5c3bea5863038fe489b44d9e368d7adb5646e4c9004a5d8500ca1de95240340336fb4635c4bf96feb004a00b
-
SSDEEP
1536:sQJ+vIofChluDAR7D9Iqtd+b3XhWkODXfzHbiOeUI:s1VKhl4A19Xf+b3XhEreOeZ
Behavioral task
behavioral1
Sample
CookieScript.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
CookieScript.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
xworm
letter-diamonds.gl.at.ply.gg:59777
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
CookieScript.exe
-
Size
70KB
-
MD5
db991a8bbad955983d68121fea62aa1a
-
SHA1
d103e2def0fb83b53edc95e81eb4e7e7a33f46f9
-
SHA256
b47e2ebd5df87d6fe2b540f94aa188eae6f45f0df94815c35d4f2a9e4db08f38
-
SHA512
f2a60a290c5079e559d8e1d3210822a1a8f01d6d5c3bea5863038fe489b44d9e368d7adb5646e4c9004a5d8500ca1de95240340336fb4635c4bf96feb004a00b
-
SSDEEP
1536:sQJ+vIofChluDAR7D9Iqtd+b3XhWkODXfzHbiOeUI:s1VKhl4A19Xf+b3XhEreOeZ
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1