General

  • Target

    Desktop.rar

  • Size

    234.9MB

  • Sample

    241228-fsfsnswlas

  • MD5

    0ad213221885824bf128991b0295b56e

  • SHA1

    6c309febd5dfb98eb58076265fb76e6f24c68e7a

  • SHA256

    2066f3e0c9c4ccff79349f9aedfe041766304f08a8e0da981811e87a16832903

  • SHA512

    8b9bf6259f26214f0fb55ff22d2134f1b42baa312c684fbbce7a577fce38aa52b59d967ad4364e20309046af2c7bcc1e14f9ac7105c49e19f80329e4f916c6e8

  • SSDEEP

    3145728:EEtlRJD0+gmU7zbsNp55EaZkin0PeOO7WsS0ca+E3lNnZT25OH5kN4NQ908t24lh:ECaSdb0iR97vqaV3lNZykkRm0yP8SkR

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

newstartagain.servequake.com:6606

newstartagain.servequake.com:7707

newstartagain.servequake.com:8808

newstartagain50.duckdns.org:6606

newstartagain50.duckdns.org:7707

newstartagain50.duckdns.org:8808

Mutex

Fm255Mv55doc

Attributes
  • delay

    3

  • install

    true

  • install_file

    System.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

testloggbot23-37268.portmap.host:37268

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    2lz.exe

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      Desktop.rar

    • Size

      234.9MB

    • MD5

      0ad213221885824bf128991b0295b56e

    • SHA1

      6c309febd5dfb98eb58076265fb76e6f24c68e7a

    • SHA256

      2066f3e0c9c4ccff79349f9aedfe041766304f08a8e0da981811e87a16832903

    • SHA512

      8b9bf6259f26214f0fb55ff22d2134f1b42baa312c684fbbce7a577fce38aa52b59d967ad4364e20309046af2c7bcc1e14f9ac7105c49e19f80329e4f916c6e8

    • SSDEEP

      3145728:EEtlRJD0+gmU7zbsNp55EaZkin0PeOO7WsS0ca+E3lNnZT25OH5kN4NQ908t24lh:ECaSdb0iR97vqaV3lNZykkRm0yP8SkR

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks