General

  • Target

    screensaver.zip

  • Size

    18KB

  • Sample

    240809-j4lpvaybnm

  • MD5

    9b954071c00943b3154a2e0d1f1f9795

  • SHA1

    3e8e42e9b152981c13a1d6d0ba9a3c898dde6885

  • SHA256

    9de2cbafa58a144deba35a8cf5f137e45915f8beebb95beb08a50e533428e887

  • SHA512

    e36f6367c0da7207f01089a084e1b6b28ae30b27fd783545d8ab3bc850254781ef7bbbe2940ee8753dc349e8529c540ae729e6630085525f07e080aaa453d850

  • SSDEEP

    384:fBbBhbbsKdXasoL0haVkePxbJTWBOPEERER1OM3DaCPYSr8vp6:Z1BbsyX9oLB1PjC4EhR1OuDsSr46

Malware Config

Extracted

Family

xworm

Version

5.0

C2

memorialwords.xyz:4444

Mutex

0FDfqtSCPc6omfwK

Attributes
  • Install_directory

    %AppData%

  • install_file

    Adobe\Reader\updater.exe

aes.plain

Extracted

Family

redline

Botnet

xclient

C2

memorialwords.xyz:6666

Targets

    • Target

      screensaver.exe

    • Size

      40KB

    • MD5

      532f554a589dcb3b7adbfb1f2792ff35

    • SHA1

      0bc817dc4f4f7350afc7b66e87d72f8376e3af58

    • SHA256

      1c8cc063b64f9c4f5beb55f64cf19efb96e2e9d592c221366ec9ceafc4f9c545

    • SHA512

      d513e4d630cd81e0bc22f8131d4cbe521847845e2f129ba961b1f83e97216af5a21a0e8a77c27fdfe115104901a06b7b56294f7fe52f1f6854e8e1dc3c57c5b1

    • SSDEEP

      768:v9aG+ZAGcowW/A1rAmhNdATtF5PG9IhoOwhk3IEJ:vwAL0A1MEApFo9IGOwahJ

    • Detect Xworm Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks