General

  • Target

    c3bbb675ebfb5dc5d747551529c7feea42f8eeef6675d.exe

  • Size

    32KB

  • Sample

    241106-cfkpbatcnk

  • MD5

    e5f31c2d85adf65d285841220280cf4f

  • SHA1

    67277c68a170e03f4445211fbabf2b09995a98cd

  • SHA256

    c3bbb675ebfb5dc5d747551529c7feea42f8eeef6675d76f37afa87bcbf02ab3

  • SHA512

    ab5dc9ab8658adbb7ad5410de895834c72414214b616e1610b874ed885f68cd615c0fcc9afe017e77e0c931d474bdd580f70a0487170a84bd2cf973685fbb26b

  • SSDEEP

    384:jEbmX5Qa+vN1h1+X3v6JFjL+g93Tm2eaFObJdRApkFTBLTsOZwpGd2v99IkuisVj:wVa+vNtg+PB93Tw42JdVFE9jdOjhmbM

Malware Config

Extracted

Family

xworm

Version

5.0

C2

89.110.95.189:7000

Mutex

imlO5snuY8Gb0egY

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

redline

Botnet

cheat

C2

89.110.95.189:45697

Targets

    • Target

      c3bbb675ebfb5dc5d747551529c7feea42f8eeef6675d.exe

    • Size

      32KB

    • MD5

      e5f31c2d85adf65d285841220280cf4f

    • SHA1

      67277c68a170e03f4445211fbabf2b09995a98cd

    • SHA256

      c3bbb675ebfb5dc5d747551529c7feea42f8eeef6675d76f37afa87bcbf02ab3

    • SHA512

      ab5dc9ab8658adbb7ad5410de895834c72414214b616e1610b874ed885f68cd615c0fcc9afe017e77e0c931d474bdd580f70a0487170a84bd2cf973685fbb26b

    • SSDEEP

      384:jEbmX5Qa+vN1h1+X3v6JFjL+g93Tm2eaFObJdRApkFTBLTsOZwpGd2v99IkuisVj:wVa+vNtg+PB93Tw42JdVFE9jdOjhmbM

    • Detect Xworm Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks