General
-
Target
screensaver.zip
-
Size
18KB
-
Sample
240809-j4lpvaybnm
-
MD5
9b954071c00943b3154a2e0d1f1f9795
-
SHA1
3e8e42e9b152981c13a1d6d0ba9a3c898dde6885
-
SHA256
9de2cbafa58a144deba35a8cf5f137e45915f8beebb95beb08a50e533428e887
-
SHA512
e36f6367c0da7207f01089a084e1b6b28ae30b27fd783545d8ab3bc850254781ef7bbbe2940ee8753dc349e8529c540ae729e6630085525f07e080aaa453d850
-
SSDEEP
384:fBbBhbbsKdXasoL0haVkePxbJTWBOPEERER1OM3DaCPYSr8vp6:Z1BbsyX9oLB1PjC4EhR1OuDsSr46
Behavioral task
behavioral1
Sample
screensaver.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
screensaver.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
memorialwords.xyz:4444
0FDfqtSCPc6omfwK
-
Install_directory
%AppData%
-
install_file
Adobe\Reader\updater.exe
Extracted
redline
xclient
memorialwords.xyz:6666
Targets
-
-
Target
screensaver.exe
-
Size
40KB
-
MD5
532f554a589dcb3b7adbfb1f2792ff35
-
SHA1
0bc817dc4f4f7350afc7b66e87d72f8376e3af58
-
SHA256
1c8cc063b64f9c4f5beb55f64cf19efb96e2e9d592c221366ec9ceafc4f9c545
-
SHA512
d513e4d630cd81e0bc22f8131d4cbe521847845e2f129ba961b1f83e97216af5a21a0e8a77c27fdfe115104901a06b7b56294f7fe52f1f6854e8e1dc3c57c5b1
-
SSDEEP
768:v9aG+ZAGcowW/A1rAmhNdATtF5PG9IhoOwhk3IEJ:vwAL0A1MEApFo9IGOwahJ
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2