General

  • Target

    UserOOBEBroker.exe

  • Size

    105.5MB

  • Sample

    240813-j4ld3sxekn

  • MD5

    3ffa9625fdd39b7160430ec903cd2688

  • SHA1

    2b07febc39ca067b234c1ab574477e459f1574af

  • SHA256

    55268bd92f0f5ed2956d2e5a4cf0f583fd1036197be092c24236d5761752a6ed

  • SHA512

    4e33c44c2e0a7c053c66c378a247ac48787d2f4de00316809d4619b9f09e302d6f0b34a1609667a820a568c2287383290dee8720d80470cc01c9e8d30fddeb9c

  • SSDEEP

    786432:G7aJ7vCmorl0yxfYkyQdBFrJJSl62HjeqHUQvvozHjrxjLmSYbnk6Kno1hiX:

Malware Config

Extracted

Family

xworm

C2

redslide133-49604.portmap.host:49604

wiz.bounceme.net:6000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7245769901:AAG_37K7d0DlKNRIZshszMjtQDXRfUiSCa4/sendMessage?chat_id=6652235050

aes.plain

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/u8f09e5b

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Targets

    • Target

      UserOOBEBroker.exe

    • Size

      105.5MB

    • MD5

      3ffa9625fdd39b7160430ec903cd2688

    • SHA1

      2b07febc39ca067b234c1ab574477e459f1574af

    • SHA256

      55268bd92f0f5ed2956d2e5a4cf0f583fd1036197be092c24236d5761752a6ed

    • SHA512

      4e33c44c2e0a7c053c66c378a247ac48787d2f4de00316809d4619b9f09e302d6f0b34a1609667a820a568c2287383290dee8720d80470cc01c9e8d30fddeb9c

    • SSDEEP

      786432:G7aJ7vCmorl0yxfYkyQdBFrJJSl62HjeqHUQvvozHjrxjLmSYbnk6Kno1hiX:

    • Detect Xworm Payload

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks