General

  • Target

    XWorm V5.6.zip

  • Size

    24.8MB

  • Sample

    250421-ffw9wsvpy6

  • MD5

    79dbcfc4041b31d47e63abd1d08ecc91

  • SHA1

    2b5df69e6999ba107ef54feeaefd288d96e86141

  • SHA256

    f01bae5d62f6320edfba317ce34413659200c30ace28fc9f671425c355e063ce

  • SHA512

    c89a9e1bf582755525b3e70c9c32a9b7a03f4b7c6092af1efccd740a02069dffed666d6dc26c76c98a98cc5c6f528437f32c45733211a37f05490bfff3669cfb

  • SSDEEP

    786432:yy64XDBYQwrmiNkjiKV6LRDPskSvmXSuO5qN:Q4XDBYlrrkjiKgRLskOjE

Malware Config

Extracted

Family

xworm

Version

5.0

C2

217.195.153.81:50000

127.0.0.1:7000

Mutex

5UXpujbt6vWtkdEG

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

aes.plain
aes.plain

Targets

    • Target

      XwormLoader.exe

    • Size

      8.0MB

    • MD5

      2d19886d92d96cbc75d0045c88ddb83a

    • SHA1

      6ecda95b7b6da8a7c14a0394c1e9a2e76f9e5c5e

    • SHA256

      d48f1ebd2111d5b730787c3d2247c27da0b35d95a2363aa70490e0e3db6e06a0

    • SHA512

      a975de161952f092c97b7f6990da127e0aaf244ce9603508b0c377781cd4e67c84bf091e77b458f48f8354118afb45d292e0280535807ba26f0c6d28d57e7b1d

    • SSDEEP

      196608:eXin21AV7RTxZxNsh9hGb8Wo+Nu1juzy9w6W3ADORlIG:dZ3XxNsjhGbXo+NuFuzy9w9wD42G

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks