General

  • Target

    1948-3256-0x0000000000280000-0x00000000006F6000-memory.dmp

  • Size

    4.5MB

  • Sample

    241212-p1sxmsvjf1

  • MD5

    eec4846c90248ff65d830b524c24c5f5

  • SHA1

    67021b1dd3a96f5f79a547cf4aa4ff11dda6c43e

  • SHA256

    e2a519a58e753ecf3615db5eea5540543689a8c951fe8de4aa3e3d74b2197a96

  • SHA512

    c80eacf3bb09f225b6004ea161341e00eb7bc5b3a7a93c2b15ef333e160513224b0a0dd2d5ebf15d74aa31386c9b6b184898525ac58911e51f8444f5a4c082de

  • SSDEEP

    98304:NQ3bSgyY4KJapJenfZmDGXHoCpyJyEptzh8n05QHwV:NQhZnxm3ZRhV5NV

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8080

101.99.92.189:8080

Mutex

d5gQ6Zf7Tzih1Pi1

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

redline

Botnet

1234

C2

kn1vcic.localto.net:7163

Targets

    • Target

      1948-3256-0x0000000000280000-0x00000000006F6000-memory.dmp

    • Size

      4.5MB

    • MD5

      eec4846c90248ff65d830b524c24c5f5

    • SHA1

      67021b1dd3a96f5f79a547cf4aa4ff11dda6c43e

    • SHA256

      e2a519a58e753ecf3615db5eea5540543689a8c951fe8de4aa3e3d74b2197a96

    • SHA512

      c80eacf3bb09f225b6004ea161341e00eb7bc5b3a7a93c2b15ef333e160513224b0a0dd2d5ebf15d74aa31386c9b6b184898525ac58911e51f8444f5a4c082de

    • SSDEEP

      98304:NQ3bSgyY4KJapJenfZmDGXHoCpyJyEptzh8n05QHwV:NQhZnxm3ZRhV5NV

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks