General

  • Target

    45900ccea0bcf76e534024db64efe46c18403955cc49d73928e3ee0c86dac9a2

  • Size

    5.6MB

  • Sample

    241110-11dy9swjfx

  • MD5

    8c0620caca03f0d3e587d2259beaa902

  • SHA1

    245fc23d0ea9ead68c55d0dd3eb2f9ed8014b500

  • SHA256

    45900ccea0bcf76e534024db64efe46c18403955cc49d73928e3ee0c86dac9a2

  • SHA512

    3dc69cae634c8737e9bf80cb5cf726130a0ca22daf9babf30fb54ad86536b1334be05545b691cafdd4b8b8aec4e7770e5f73ae5262bafca13cf6f9f9d6648e4c

  • SSDEEP

    98304:NKNOFADb/dvWGXKNOFADb/dvWGtKNOFADb/dvWGXKjKWQckVgtev5mnlNL:NKNOOXKNOOtKNOOcKWQc0gEYnvL

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

xworm

C2

issues-tgp.gl.at.ply.gg:42158

Attributes
  • install_file

    USB.exe

Targets

    • Target

      45900ccea0bcf76e534024db64efe46c18403955cc49d73928e3ee0c86dac9a2

    • Size

      5.6MB

    • MD5

      8c0620caca03f0d3e587d2259beaa902

    • SHA1

      245fc23d0ea9ead68c55d0dd3eb2f9ed8014b500

    • SHA256

      45900ccea0bcf76e534024db64efe46c18403955cc49d73928e3ee0c86dac9a2

    • SHA512

      3dc69cae634c8737e9bf80cb5cf726130a0ca22daf9babf30fb54ad86536b1334be05545b691cafdd4b8b8aec4e7770e5f73ae5262bafca13cf6f9f9d6648e4c

    • SSDEEP

      98304:NKNOFADb/dvWGXKNOFADb/dvWGtKNOFADb/dvWGXKjKWQckVgtev5mnlNL:NKNOOXKNOOtKNOOcKWQc0gEYnvL

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks