General

  • Target

    FreeFiveM.exe

  • Size

    3.0MB

  • Sample

    241117-zb95qsxmat

  • MD5

    52874f3a12ccd46f6350b06ad1c7b949

  • SHA1

    efa774e596c8fcf817fdd38e15ab94eea815859c

  • SHA256

    99343d88241716c3af22c71ebbbe1a846524d96c8d53fc11870aea6957505a6c

  • SHA512

    0774770065ea5d1fe8c17630115f3b96958bb194b447a86a9371d9af235f6b65764e69a4cc84b9a5c631ff6ec1dc450dacf7f21a506c9439ce80f4082af056f3

  • SSDEEP

    49152:ensHyjtk2MYC5GDunsHyjtk2MYC5GDInFJEsuoh6WRnGBl1nN8z:ensmtk2aLnsmtk2aTFjFGBKz

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

xworm

C2

review-tennis.gl.at.ply.gg:37622

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost2.exe

  • telegram

    https://api.telegram.org/bot7326491521:AAHlNX1AHs0be6K8nhvysevBir5JQbB6QP0/sendMessage?chat_id=7268548907

Targets

    • Target

      FreeFiveM.exe

    • Size

      3.0MB

    • MD5

      52874f3a12ccd46f6350b06ad1c7b949

    • SHA1

      efa774e596c8fcf817fdd38e15ab94eea815859c

    • SHA256

      99343d88241716c3af22c71ebbbe1a846524d96c8d53fc11870aea6957505a6c

    • SHA512

      0774770065ea5d1fe8c17630115f3b96958bb194b447a86a9371d9af235f6b65764e69a4cc84b9a5c631ff6ec1dc450dacf7f21a506c9439ce80f4082af056f3

    • SSDEEP

      49152:ensHyjtk2MYC5GDunsHyjtk2MYC5GDInFJEsuoh6WRnGBl1nN8z:ensmtk2aLnsmtk2aTFjFGBKz

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks