General

  • Target

    New Order PO_O8475980U09_Inquiry,pdf.tbz

  • Size

    460KB

  • Sample

    241205-s83nlaxkfm

  • MD5

    39607b5a96e5655609e39105b4fb3821

  • SHA1

    ef4a9e345b2dd7db9527a336747feb6a21722441

  • SHA256

    0415c597da572bf22be7df0f07f3280ceb2140cc53b737225c1296015c6d67ab

  • SHA512

    fb87cb32d965b16507260095bbfdf95f407e98f91410b8c08711c670f6f1a09e903aad1844af095f25bbd379bb5e16fcba6801e7fb803f1241b95edee37cd4b9

  • SSDEEP

    12288:rTJY2wMPADnx0DN7srf7XolTBlYZ09yMB7sQo:/J1PSx0DN+zYlf6QFsQo

Malware Config

Extracted

Family

xworm

Version

5.0

C2

212.162.149.196:7967

Mutex

7rZTXi0ZDltxTxRZ

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

redline

Botnet

success

C2

212.162.149.196:8062

Targets

    • Target

      New Order PO_O8475980U09_Inquiry,pdf.exe

    • Size

      944KB

    • MD5

      13c7674b5ddf04d0c1ff4c44b12aa4d4

    • SHA1

      2d46412c7a2046c27b6549a31ad3dd9bf9a0935d

    • SHA256

      d3e83ecbfc6ead31c132b85910c6dd0c7a0e5bb343231a289cdc4203fbd9d6ad

    • SHA512

      2da740d5fdcdc49b9985bff25e2fdb187c9fb1545aaccccc895af46bb25a68b7f6966305bb07bf2340da0f223e364f250779d6ccc7d24273136eda141437a665

    • SSDEEP

      24576:zu6J33O0c+JY5UZ+XC0kGso6FaPAe2tQlvJWY:du0c++OCvkGs9FaPAeUY

    • Detect Xworm Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks