General
-
Target
XWorm V5.6.zip
-
Size
24.8MB
-
Sample
250421-ffw9wsvpy6
-
MD5
79dbcfc4041b31d47e63abd1d08ecc91
-
SHA1
2b5df69e6999ba107ef54feeaefd288d96e86141
-
SHA256
f01bae5d62f6320edfba317ce34413659200c30ace28fc9f671425c355e063ce
-
SHA512
c89a9e1bf582755525b3e70c9c32a9b7a03f4b7c6092af1efccd740a02069dffed666d6dc26c76c98a98cc5c6f528437f32c45733211a37f05490bfff3669cfb
-
SSDEEP
786432:yy64XDBYQwrmiNkjiKV6LRDPskSvmXSuO5qN:Q4XDBYlrrkjiKgRLskOjE
Behavioral task
behavioral1
Sample
XwormLoader.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
XwormLoader.exe
Resource
win11-20250410-en
Malware Config
Extracted
xworm
5.0
217.195.153.81:50000
127.0.0.1:7000
5UXpujbt6vWtkdEG
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Targets
-
-
Target
XwormLoader.exe
-
Size
8.0MB
-
MD5
2d19886d92d96cbc75d0045c88ddb83a
-
SHA1
6ecda95b7b6da8a7c14a0394c1e9a2e76f9e5c5e
-
SHA256
d48f1ebd2111d5b730787c3d2247c27da0b35d95a2363aa70490e0e3db6e06a0
-
SHA512
a975de161952f092c97b7f6990da127e0aaf244ce9603508b0c377781cd4e67c84bf091e77b458f48f8354118afb45d292e0280535807ba26f0c6d28d57e7b1d
-
SSDEEP
196608:eXin21AV7RTxZxNsh9hGb8Wo+Nu1juzy9w6W3ADORlIG:dZ3XxNsjhGbXo+NuFuzy9w9wD42G
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2