General

  • Target

    UPDATE INTERNAL JAXX SHIT.exe

  • Size

    2.0MB

  • Sample

    241223-v9rc3awnas

  • MD5

    c253cfaedd1d9da42f634bbeee60a1f1

  • SHA1

    4f5db9b353831e4fd574599590e18060b5bef046

  • SHA256

    17e9b9671209644815f245388c1a676efa400a5425ba632cb4aedab455ba0511

  • SHA512

    f50ea95286e7d1ec6c8e8f0dc5459d10e695306dd58e190d716513a6df6a11c92a9a58e2de04da13c6419af776b0a710fd6d313d306da73e9acd3bf18afa4782

  • SSDEEP

    49152:uGcPzld1F9Uy0DVo4aZLjGdRxWGYzuxo2Pj2ZGX:uh7n1h0DV6ZLjGdCGYam2PjAG

Malware Config

Extracted

Family

xworm

Version

5.0

C2

terms-hold.gl.at.ply.gg:22825

Mutex

anL8Q4Rm5NG9cHYr

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

aes.plain

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      UPDATE INTERNAL JAXX SHIT.exe

    • Size

      2.0MB

    • MD5

      c253cfaedd1d9da42f634bbeee60a1f1

    • SHA1

      4f5db9b353831e4fd574599590e18060b5bef046

    • SHA256

      17e9b9671209644815f245388c1a676efa400a5425ba632cb4aedab455ba0511

    • SHA512

      f50ea95286e7d1ec6c8e8f0dc5459d10e695306dd58e190d716513a6df6a11c92a9a58e2de04da13c6419af776b0a710fd6d313d306da73e9acd3bf18afa4782

    • SSDEEP

      49152:uGcPzld1F9Uy0DVo4aZLjGdRxWGYzuxo2Pj2ZGX:uh7n1h0DV6ZLjGdCGYam2PjAG

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks