General

  • Target

    DALL·E 2025-03-06 10.16.38 - A beautiful night scene celebrating Ramadan. In the foreground, a group of human-like people are standing together, forming a heart shape with their a.webp

  • Size

    392KB

  • Sample

    250306-nevcxaw1hz

  • MD5

    c8247385db6781d657965411ecc8dce5

  • SHA1

    64247b98218b509b2d703ebcdd07c1d783cded71

  • SHA256

    b1ec420d062e732f3bb0a742115ba1773cff5e9db9464a8975ffc25c1408962a

  • SHA512

    01641ea652f7ff20f7b24af83b62325c9763bce0ee77c7c44ddd1f36b39a3e05950be95c6c6a78a6bc3bde222727579a607f0f150df747a9d6bc5cfa1b38de66

  • SSDEEP

    6144:3P3Gu5sYsrA0dkxswJlbA9Z8AkMRaTgvF0ocj/STZ/8J9vUpyKi+tmzLago4Na:3PXsYsrA04E9WAWfOT6J97esXagoL

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/ashley20021ss/nini/releases/download/yes/DarkStream.exe

Extracted

Family

xworm

Version

5.0

C2

10.0.0.2:9999

Mutex

cdhmwEW0NV7oheU1

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      DALL·E 2025-03-06 10.16.38 - A beautiful night scene celebrating Ramadan. In the foreground, a group of human-like people are standing together, forming a heart shape with their a.webp

    • Size

      392KB

    • MD5

      c8247385db6781d657965411ecc8dce5

    • SHA1

      64247b98218b509b2d703ebcdd07c1d783cded71

    • SHA256

      b1ec420d062e732f3bb0a742115ba1773cff5e9db9464a8975ffc25c1408962a

    • SHA512

      01641ea652f7ff20f7b24af83b62325c9763bce0ee77c7c44ddd1f36b39a3e05950be95c6c6a78a6bc3bde222727579a607f0f150df747a9d6bc5cfa1b38de66

    • SSDEEP

      6144:3P3Gu5sYsrA0dkxswJlbA9Z8AkMRaTgvF0ocj/STZ/8J9vUpyKi+tmzLago4Na:3PXsYsrA04E9WAWfOT6J97esXagoL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks