General
-
Target
Code Stealer dll For Hd PLAYER.vmp.rar
-
Size
4.9MB
-
Sample
241106-l8t8wsxmhw
-
MD5
b8ac97cb93db9cfc1e864cac96e07710
-
SHA1
dee684cba111cc44bdbd1d7375f46452fbb9387e
-
SHA256
75d273cc64cecf71e838ac7c78292775a0422b752911b152600cb115416dee51
-
SHA512
062393b949c78c303f0b9127b5e457a62fa34232b2ea45547a4a5767cee1e7914345dddbf9d033c64ba65183c509d70456f0592e46ef50ccdeab68e6250839ee
-
SSDEEP
98304:7jeJp8pihnGUMiTBVQVIu9NQIt9ioNHgZbFGnUNu55qJPURp4PBZhtvB:7jeL2iTPQVIu9qENmGUNC85VPBPtp
Static task
static1
Behavioral task
behavioral1
Sample
Code Stealer dll For Hd PLAYER.vmp.exe
Resource
win7-20241010-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
xworm
147.185.221.23:10012
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Targets
-
-
Target
Code Stealer dll For Hd PLAYER.vmp.exe
-
Size
5.0MB
-
MD5
e84c6027daaea05c5c965f5f6062ba2c
-
SHA1
b6a04707a087125031a7d2b14a6b7493b5022168
-
SHA256
8d215ea18cb15661a37b9eeb4abc861670c39ea8b6e98b0f62b43763e6bce63f
-
SHA512
6e1351c090989846d888bdea4ac7ea716c507ab6b89b1154cf76b0b622ea09bd0c50ca1036db056f578bea362d3d360f00be50a0e92e3637f6ff5626ecdbfb50
-
SSDEEP
98304:eadFE3ZtxlzJtME/CFNeETYhj17tSVvgkZ28MsMNULbXZof/nuy:eadaXjzzM/eETYhj1g28zZE9
-
Detect Xworm Payload
-
Xred family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-