General

  • Target

    Nw-Inst64.exe

  • Size

    1.8MB

  • Sample

    250325-mayzvsxr14

  • MD5

    3386e2abdfb0d9549bfba2cce6ca7689

  • SHA1

    ed6cb1b6d742f644ea2d1450c84a715d0b342d5c

  • SHA256

    6a4c87064969595078355dae42918fc19c3b71f422d6b5af9cee50a2af2d7b88

  • SHA512

    8f5af4ba0f985ef0b2ebb0a1518f07ad39feac4c355587fa4b1db093d8f763bff4484488a7692550fa458499af696dc2d09c54266a7a2ecfe1340de97eacf8de

  • SSDEEP

    49152:TRWp/PzUuHrGdkuxEiRMmWqf2/wzfUMrf5yfdoP+krDDjJOeZs:TEJPzXHrGdkuWJmWZ4CfdoPhXJOk

Malware Config

Extracted

Family

xworm

C2

89.39.121.169:9000

Attributes
  • Install_directory

    %AppData%

  • install_file

    RunShell.exe

Targets

    • Target

      Nw-Inst64.exe

    • Size

      1.8MB

    • MD5

      3386e2abdfb0d9549bfba2cce6ca7689

    • SHA1

      ed6cb1b6d742f644ea2d1450c84a715d0b342d5c

    • SHA256

      6a4c87064969595078355dae42918fc19c3b71f422d6b5af9cee50a2af2d7b88

    • SHA512

      8f5af4ba0f985ef0b2ebb0a1518f07ad39feac4c355587fa4b1db093d8f763bff4484488a7692550fa458499af696dc2d09c54266a7a2ecfe1340de97eacf8de

    • SSDEEP

      49152:TRWp/PzUuHrGdkuxEiRMmWqf2/wzfUMrf5yfdoP+krDDjJOeZs:TEJPzXHrGdkuWJmWZ4CfdoPhXJOk

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks