General

  • Target

    Request for Invoice to Process Payment.zip

  • Size

    870KB

  • Sample

    250228-sxknms1rw9

  • MD5

    1e2bc4467a1ca17e33ede3f3cc68920d

  • SHA1

    86faa46632bb2c7700c1d5ccbf716ccaa15344b2

  • SHA256

    3aece62e514da11c67ac56435e3f2da7cf63d38a75f4d716dcaaa36310915eff

  • SHA512

    3bb64e4ae30192d108e9784261e652f8bd88b8b9c15c21b2997b26716b6ba86e83f594abeaf4887930232b7115ca03ce76b6469b78062004028eb29893f78c47

  • SSDEEP

    24576:xnhY06LZ8HmfB8dFhOXohBIaQwU85l8ksU:xhY06N8GfBWF3hLrU8HXsU

Malware Config

Extracted

Family

xworm

C2

23.94.126.41:8888

Attributes
  • install_file

    USB.exe

Targets

    • Target

      Request for Invoice to Process Payment.exe

    • Size

      1.8MB

    • MD5

      6f1ead21aa70a3e69cd5c69595fc7916

    • SHA1

      5feacb3a236a1e2a981540aca03fc6ab16d2aa76

    • SHA256

      36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7

    • SHA512

      800dc490d482582859ce6a1be834c5a13b501489329eab592fcc67f128462aa8424c9f5f5ec351124b9df660a1e8044786ce6b488ee34fdd0bf37fe9f2d224d5

    • SSDEEP

      24576:95tC5kWkHIVTl45p3aLpZsEFj8z2NJMW1O1EmSSTCSHkbe:9W7OQpZsEFBNsEmw

    • Detect Xworm Payload

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks