General

  • Target

    https://mega.nz/file/uSphgLgb#69aDrgtQ9tl8A82nUBWtqbVv1eVzsJYA8nH14y3Vyyk

  • Sample

    250402-pex98swwgx

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:16843

animal-premium.gl.at.ply.gg:16843

Attributes
  • Install_directory

    %AppData%

  • install_file

    svhost.exe

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1355968893453336801/MF72-4a-KZBP8oGrrbhLSD9XFGhNcZ7mDsIbWQyt_AVrZQXQ1aLujjdsWamWBDTUeX7X

Targets

    • Target

      https://mega.nz/file/uSphgLgb#69aDrgtQ9tl8A82nUBWtqbVv1eVzsJYA8nH14y3Vyyk

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks