Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Notice_bill_of_lading_number_HAWB_771434342326.7z

  • Size

    1.0MB

  • Sample

    250314-xa61kszmz7

  • MD5

    0f0c0badf4c550ada5ad4bf54b70f16d

  • SHA1

    2f87f9252b9ffec670d86b47495e13a173a59113

  • SHA256

    a090efb31e14bc3bcd1d2c0b3b3ff74123c7fcaa6bd9c6bcacece1dadb904594

  • SHA512

    b8f78135332d23c5604adaa85bcf806d21dba55da5a7ebe0a9ccb5a833820ed05512a115f525d5209409e7a46453268b0e36f3b9c2403a05f8f5882222f77032

  • SSDEEP

    24576:qHKmOqJmATQ7sGfZHIhvFn8R+EvCvu/EEk1riy5:IKWNJGGhvFn8R+CUrik

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.xma0.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    london@1759

Extracted

Family

xworm

Version

5.0

C2

204.10.161.147:7081

Mutex

XoFHv1TT4hWErxRo

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      Notice_bill_of_lading_number_HAWB_771434342326.exe

    • Size

      1.1MB

    • MD5

      14eac5d4385edf42ee4b30a738348c34

    • SHA1

      ebdd198f3cc8250d279773cbbd85422c5a2ffdb6

    • SHA256

      0638ab8a2a8a1c7d8e7f5b5fd0b267d875a8298a166e929cc85bd69122657800

    • SHA512

      f84a52164ea695a674023f2e6717725c3b3692ad14cd69a47f3b217b4ccda04c5048969bbd72a7902d137f8f9d648dfebe8a5e275aa4d9b82ed7bdfd7ef3c7b2

    • SSDEEP

      24576:HugHDkJgxyAFQBsGNGHICvMh8RSEAbLvK9EkPHrh1YA00:/HDl13G7CvMh8RSBQHrw

    • Detect Xworm Payload

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks