General

  • Target

    FreeCheat.exe

  • Size

    809KB

  • Sample

    241109-nyxblssqh1

  • MD5

    94d86e51d8f55a38484c0147f5a4639a

  • SHA1

    f3eb5147cca4067c43033280ab7b24b6843c7047

  • SHA256

    2bd965f29bf25dfa230be112a130a519937c00e02c498dde8d67ae4d3258de99

  • SHA512

    e26370075cc154c12388ff1cbdaa74643c020d21ae6e17d7a9ee0e49e8e7365e35c58e1cd8478fe6bf81f2475d9dbcfd1296f69f4e7324f57a6dd5d26ea26c71

  • SSDEEP

    12288:yMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9VS+OzhJCgws:ynsJ39LyjbJkQFMhmC+6GD9wn

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

xworm

C2

review-tennis.gl.at.ply.gg:37622

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost2.exe

  • telegram

    https://api.telegram.org/bot7326491521:AAHlNX1AHs0be6K8nhvysevBir5JQbB6QP0/sendMessage?chat_id=7268548907

Targets

    • Target

      FreeCheat.exe

    • Size

      809KB

    • MD5

      94d86e51d8f55a38484c0147f5a4639a

    • SHA1

      f3eb5147cca4067c43033280ab7b24b6843c7047

    • SHA256

      2bd965f29bf25dfa230be112a130a519937c00e02c498dde8d67ae4d3258de99

    • SHA512

      e26370075cc154c12388ff1cbdaa74643c020d21ae6e17d7a9ee0e49e8e7365e35c58e1cd8478fe6bf81f2475d9dbcfd1296f69f4e7324f57a6dd5d26ea26c71

    • SSDEEP

      12288:yMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9VS+OzhJCgws:ynsJ39LyjbJkQFMhmC+6GD9wn

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks