General

  • Target

    XClient.exe

  • Size

    181KB

  • Sample

    250210-vfky7aylft

  • MD5

    cc753ab1d8daac56d1e705e62d632537

  • SHA1

    7950dc74519b207c3e24bbaa104df978a56872cb

  • SHA256

    1578626a3dcfb7b8f1b45b8a4ae7dddb8a185a9f8b5078bde4b094a93da14097

  • SHA512

    3dfc0e2d1ab6bf2dba387dc9fb1bb3cc1b61ff84ce0ace8569ad138121ef0a2abfdacfe4c96559b425bdda2b7c7ba7da7df0e618cc9f3a76a5ca4ca5179325f0

  • SSDEEP

    1536:LkZLPk11vanHyaRxXT2Ug+bNoZ8Avnn6emGOEPgHEJtP8TNUPhoHEq:wVf3g+bNMvnRmGOEN18TN8IEq

Malware Config

Extracted

Family

xworm

C2

93.80.32.255:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    system132.bind.exe

  • telegram

    https://api.telegram.org/bot7603136465:AAFpLP6n-3zudeL31J79Iemu9BCZkFG8shw/sendMessage?chat_id=5177525105

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7603136465:AAFpLP6n-3zudeL31J79Iemu9BCZkFG8shw/sendMessage?chat_id=5177525105

Targets

    • Target

      XClient.exe

    • Size

      181KB

    • MD5

      cc753ab1d8daac56d1e705e62d632537

    • SHA1

      7950dc74519b207c3e24bbaa104df978a56872cb

    • SHA256

      1578626a3dcfb7b8f1b45b8a4ae7dddb8a185a9f8b5078bde4b094a93da14097

    • SHA512

      3dfc0e2d1ab6bf2dba387dc9fb1bb3cc1b61ff84ce0ace8569ad138121ef0a2abfdacfe4c96559b425bdda2b7c7ba7da7df0e618cc9f3a76a5ca4ca5179325f0

    • SSDEEP

      1536:LkZLPk11vanHyaRxXT2Ug+bNoZ8Avnn6emGOEPgHEJtP8TNUPhoHEq:wVf3g+bNMvnRmGOEN18TN8IEq

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks