Resubmissions

23-02-2025 11:56

250223-n4c5xswmd1 3

23-02-2025 11:22

250223-ngvrfsvmds 10

23-02-2025 09:27

250223-leqzda1rcr 8

22-02-2025 15:10

250222-skjwks1qa1 1

22-02-2025 15:10

250222-sj2p1askbk 1

General

  • Target

    test.txt

  • Size

    18B

  • Sample

    250223-ll5q4ssry3

  • MD5

    5b3f97d48c8751bd031b7ea53545bdb6

  • SHA1

    88be3374c62f23406ec83bb11279f8423bd3f88d

  • SHA256

    d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

  • SHA512

    ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

Malware Config

Extracted

Family

xworm

C2

printer-foundations.gl.at.ply.gg:443

printer-foundations.gl.at.ply.gg:44421:443

sadsadsd-26556.portmap.host:443

sadsadsd-26556.portmap.host:26556:443

printer-foundations.gl.at.ply.gg:1

printer-foundations.gl.at.ply.gg:44421:1

sadsadsd-26556.portmap.host:1

sadsadsd-26556.portmap.host:26556:1

printer-foundations.gl.at.ply.gg:44421

printer-foundations.gl.at.ply.gg:44421:44421

sadsadsd-26556.portmap.host:44421

sadsadsd-26556.portmap.host:26556:44421

printer-foundations.gl.at.ply.gg:26556

printer-foundations.gl.at.ply.gg:44421:26556

sadsadsd-26556.portmap.host:26556

sadsadsd-26556.portmap.host:26556:26556

Attributes
  • install_file

    USB.exe

Extracted

Family

xworm

Version

5.0

C2

sadsadsd-26556.portmap.host:26556

Mutex

4oiY4RLjbkMvhKam

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      test.txt

    • Size

      18B

    • MD5

      5b3f97d48c8751bd031b7ea53545bdb6

    • SHA1

      88be3374c62f23406ec83bb11279f8423bd3f88d

    • SHA256

      d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

    • SHA512

      ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Disables service(s)

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies boot configuration data using bcdedit

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Modifies Windows Firewall

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks