General

  • Target

    Code Stealer dll For Hd PLAYER.vmp.exe

  • Size

    5.0MB

  • Sample

    241106-lp1lkazpgn

  • MD5

    e84c6027daaea05c5c965f5f6062ba2c

  • SHA1

    b6a04707a087125031a7d2b14a6b7493b5022168

  • SHA256

    8d215ea18cb15661a37b9eeb4abc861670c39ea8b6e98b0f62b43763e6bce63f

  • SHA512

    6e1351c090989846d888bdea4ac7ea716c507ab6b89b1154cf76b0b622ea09bd0c50ca1036db056f578bea362d3d360f00be50a0e92e3637f6ff5626ecdbfb50

  • SSDEEP

    98304:eadFE3ZtxlzJtME/CFNeETYhj17tSVvgkZ28MsMNULbXZof/nuy:eadaXjzzM/eETYhj1g28zZE9

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

xworm

C2

147.185.221.23:10012

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

Targets

    • Target

      Code Stealer dll For Hd PLAYER.vmp.exe

    • Size

      5.0MB

    • MD5

      e84c6027daaea05c5c965f5f6062ba2c

    • SHA1

      b6a04707a087125031a7d2b14a6b7493b5022168

    • SHA256

      8d215ea18cb15661a37b9eeb4abc861670c39ea8b6e98b0f62b43763e6bce63f

    • SHA512

      6e1351c090989846d888bdea4ac7ea716c507ab6b89b1154cf76b0b622ea09bd0c50ca1036db056f578bea362d3d360f00be50a0e92e3637f6ff5626ecdbfb50

    • SSDEEP

      98304:eadFE3ZtxlzJtME/CFNeETYhj17tSVvgkZ28MsMNULbXZof/nuy:eadaXjzzM/eETYhj1g28zZE9

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks