General
-
Target
2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber
-
Size
11.0MB
-
Sample
241220-waqg6a1nej
-
MD5
1216b81c1f7b36aaad1ffed2c982fa2b
-
SHA1
cc05886a6bc38396431fba11b14ddf4b4c576aa9
-
SHA256
1702a224613323deeeba21fa405ec74979e7c6e474f2d5b11973ebf4e4155972
-
SHA512
1d5fd317b16ba48b66edac90f2cdbc3ff44a048a9e9f3d92417ea12d50ee8b0ab90e097abcbc4d318a1483eda10860845e6f462ee023a1e8190d7cf545179c39
-
SSDEEP
98304:mwIMFaSRnwIMFaSRcwIMFaSRfwIMFaSRIwIMFaSRQpFK0U8AmJNIo:7JRwJR5JRYJRtJRmFKzYN
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe
Resource
win7-20240903-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
xworm
3.1
23.26.201.172:8899
REaMgxQu68UQguvi
-
install_file
USB.exe
Targets
-
-
Target
2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber
-
Size
11.0MB
-
MD5
1216b81c1f7b36aaad1ffed2c982fa2b
-
SHA1
cc05886a6bc38396431fba11b14ddf4b4c576aa9
-
SHA256
1702a224613323deeeba21fa405ec74979e7c6e474f2d5b11973ebf4e4155972
-
SHA512
1d5fd317b16ba48b66edac90f2cdbc3ff44a048a9e9f3d92417ea12d50ee8b0ab90e097abcbc4d318a1483eda10860845e6f462ee023a1e8190d7cf545179c39
-
SSDEEP
98304:mwIMFaSRnwIMFaSRcwIMFaSRfwIMFaSRIwIMFaSRQpFK0U8AmJNIo:7JRwJR5JRYJRtJRmFKzYN
-
Detect Xworm Payload
-
Xred family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1