General
-
Target
Multitool V1.exe
-
Size
307KB
-
Sample
250328-3hhkvawjv6
-
MD5
520f8ed0d73dbc6540fc80ac0c3847e1
-
SHA1
81476c36b9ea1b6d18864b90310eb95ec20e5475
-
SHA256
b148b01f921c8ee6aab7c5cb0b27b494f7ff5632f5a7dd2cbd1ccf206a5eb1ba
-
SHA512
0981f5323101a214f1ee6e57f5d10b2136213ef88b4b44e1bd769114734679c2439f6338df585712137ef01684cc7b2658a3820f79da0b196c2e7a11bb06b2e4
-
SSDEEP
6144:aMCOuWBJL5pt0UA8yTHsRRs6kkU7ezfQE62e3goypHp/3EvCcp3yVaG:aMCOucJL5pEDkU7Me3gpQTyVaG
Static task
static1
Behavioral task
behavioral1
Sample
Multitool V1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Multitool V1.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
127.0.0.1:38960
metherium-38960.portmap.host:38960
-
Install_directory
%AppData%
-
install_file
host.exe
-
telegram
https://api.telegram.org/bot7283946415:AAGGT2xYjdDOFdezS7k5STvPS9SoyGQdKEg
Targets
-
-
Target
Multitool V1.exe
-
Size
307KB
-
MD5
520f8ed0d73dbc6540fc80ac0c3847e1
-
SHA1
81476c36b9ea1b6d18864b90310eb95ec20e5475
-
SHA256
b148b01f921c8ee6aab7c5cb0b27b494f7ff5632f5a7dd2cbd1ccf206a5eb1ba
-
SHA512
0981f5323101a214f1ee6e57f5d10b2136213ef88b4b44e1bd769114734679c2439f6338df585712137ef01684cc7b2658a3820f79da0b196c2e7a11bb06b2e4
-
SSDEEP
6144:aMCOuWBJL5pt0UA8yTHsRRs6kkU7ezfQE62e3goypHp/3EvCcp3yVaG:aMCOucJL5pEDkU7Me3gpQTyVaG
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1