General

  • Target

    port.exe

  • Size

    68KB

  • Sample

    241130-mgtnqa1pdz

  • MD5

    452793cc9852ff9331bef9721e3432ed

  • SHA1

    a98e522befc7646275aff5e055016976b51c15ae

  • SHA256

    346885d414b006c9e212ae9c1b9d57c433d409fde8f811abb7015ec4230d7183

  • SHA512

    928706e4106b3f90c76dbf7c91e5a2c046e4e8caa63817388c5eb338ccdc0318c4bc4572acc6ea4e331ac63224027bbe238ce763277aeaa5adf081d69e06d2d8

  • SSDEEP

    1536:loApt3frgHIscp60EbmhUogOntu6nHZOANEI:PM1cptEboJgOntJOANEI

Malware Config

Extracted

Family

xworm

C2

more-scott.gl.at.ply.gg:4043

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      port.exe

    • Size

      68KB

    • MD5

      452793cc9852ff9331bef9721e3432ed

    • SHA1

      a98e522befc7646275aff5e055016976b51c15ae

    • SHA256

      346885d414b006c9e212ae9c1b9d57c433d409fde8f811abb7015ec4230d7183

    • SHA512

      928706e4106b3f90c76dbf7c91e5a2c046e4e8caa63817388c5eb338ccdc0318c4bc4572acc6ea4e331ac63224027bbe238ce763277aeaa5adf081d69e06d2d8

    • SSDEEP

      1536:loApt3frgHIscp60EbmhUogOntu6nHZOANEI:PM1cptEboJgOntJOANEI

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks