General

  • Target

    9d1b9105b7353da000d36facf2c6a88d8ac164e0ef0e5b3d35087ce2c746d0bf

  • Size

    862KB

  • Sample

    250227-m45z9swkw6

  • MD5

    fa67bb866526541356373b33f0f59dca

  • SHA1

    b53731f480c4e042abb1f2823e4dffe0d92eb668

  • SHA256

    9d1b9105b7353da000d36facf2c6a88d8ac164e0ef0e5b3d35087ce2c746d0bf

  • SHA512

    8f1a459ab747313135461c9f643ccb1f2fca84074d44249a53993006251e1c68582596f0c9e8c632a4176a5d0d3c718c74bc70580fe17ad6b141f1ac7248e83d

  • SSDEEP

    12288:yQqhxK0pYL8a00PiaU6bmPE2CBiKBlak98Djw1P+xovk+/aEfR9MuQ9ZLfmGtMC2:ynhY06LZ8HmfBROkJlc+/ZzMuQZLnq

Malware Config

Extracted

Family

xworm

C2

162.244.210.204:8888

Attributes
  • install_file

    USB.exe

Targets

    • Target

      LPO_2400320057.pdf.exe

    • Size

      1.8MB

    • MD5

      ad1de3461d1a1ca1e1308b470189e33e

    • SHA1

      4f31564e88f4dbef9de32921e3ce3e7577fd1025

    • SHA256

      2663813a533d2a48f9eaf8eda1b3536578377faf3008da63035fb050cb8370e3

    • SHA512

      e80da0a03b8c9b86cb59c37e9a9867a8ea21ec4bc0aa3e5c571cd80434f6c4a2b5d04dcf770d5eac098d121a6cf832eae623a73be0f9970e3417affb304d0b49

    • SSDEEP

      24576:95tC5kWkHIVTl45p3aLpZso9Tz+hGu2Wq:9W7OQpZsiOAus

    • Detect Xworm Payload

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks