General

  • Target

    XCli1ent.exe

  • Size

    36KB

  • Sample

    250301-tbm3bavpy6

  • MD5

    3d8ec94b7dcfaf52bb472918378b49a3

  • SHA1

    f868a911a25973f330ec2b56e50a746e6f32b14d

  • SHA256

    0e2ec9b0d60ba6bfc32a86dce7ed5e60d67fb142d4d14bb4a11956fe8b19d7d9

  • SHA512

    a57ac00fdc6377469d3a95bdc2715e68ca408aecf8b7e46444f401f8d93e787a5c1485886109f833b9771d07e9866610e808ba756167f55eef13750ff81f59d7

  • SSDEEP

    768:DeVXtHcDQZS9rc50UZmx/F89RF6OOMh6QJP:D8dH+o51OF89RF6OOMQy

Malware Config

Extracted

Family

xworm

Version

5.0

C2

database-victoria.gl.at.ply.gg:55358

Mutex

eIDPhmFNz0rAKYvF

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XCli1ent.exe

    • Size

      36KB

    • MD5

      3d8ec94b7dcfaf52bb472918378b49a3

    • SHA1

      f868a911a25973f330ec2b56e50a746e6f32b14d

    • SHA256

      0e2ec9b0d60ba6bfc32a86dce7ed5e60d67fb142d4d14bb4a11956fe8b19d7d9

    • SHA512

      a57ac00fdc6377469d3a95bdc2715e68ca408aecf8b7e46444f401f8d93e787a5c1485886109f833b9771d07e9866610e808ba756167f55eef13750ff81f59d7

    • SSDEEP

      768:DeVXtHcDQZS9rc50UZmx/F89RF6OOMh6QJP:D8dH+o51OF89RF6OOMQy

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Modifies termsrv.dll

      Commonly used to allow simultaneous RDP sessions.

MITRE ATT&CK Enterprise v15

Tasks