General
-
Target
Desktop.rar
-
Size
234.9MB
-
Sample
241228-fsfsnswlas
-
MD5
0ad213221885824bf128991b0295b56e
-
SHA1
6c309febd5dfb98eb58076265fb76e6f24c68e7a
-
SHA256
2066f3e0c9c4ccff79349f9aedfe041766304f08a8e0da981811e87a16832903
-
SHA512
8b9bf6259f26214f0fb55ff22d2134f1b42baa312c684fbbce7a577fce38aa52b59d967ad4364e20309046af2c7bcc1e14f9ac7105c49e19f80329e4f916c6e8
-
SSDEEP
3145728:EEtlRJD0+gmU7zbsNp55EaZkin0PeOO7WsS0ca+E3lNnZT25OH5kN4NQ908t24lh:ECaSdb0iR97vqaV3lNZykkRm0yP8SkR
Malware Config
Extracted
asyncrat
0.5.8
Default
newstartagain.servequake.com:6606
newstartagain.servequake.com:7707
newstartagain.servequake.com:8808
newstartagain50.duckdns.org:6606
newstartagain50.duckdns.org:7707
newstartagain50.duckdns.org:8808
Fm255Mv55doc
-
delay
3
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Extracted
xworm
testloggbot23-37268.portmap.host:37268
-
Install_directory
%Userprofile%
-
install_file
2lz.exe
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
Desktop.rar
-
Size
234.9MB
-
MD5
0ad213221885824bf128991b0295b56e
-
SHA1
6c309febd5dfb98eb58076265fb76e6f24c68e7a
-
SHA256
2066f3e0c9c4ccff79349f9aedfe041766304f08a8e0da981811e87a16832903
-
SHA512
8b9bf6259f26214f0fb55ff22d2134f1b42baa312c684fbbce7a577fce38aa52b59d967ad4364e20309046af2c7bcc1e14f9ac7105c49e19f80329e4f916c6e8
-
SSDEEP
3145728:EEtlRJD0+gmU7zbsNp55EaZkin0PeOO7WsS0ca+E3lNnZT25OH5kN4NQ908t24lh:ECaSdb0iR97vqaV3lNZykkRm0yP8SkR
-
Asyncrat family
-
Detect Xworm Payload
-
Xred family
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1