General

  • Target

    niggacoin.exe

  • Size

    3.6MB

  • Sample

    250105-ahevqsvjgt

  • MD5

    765acfef2d7e2ef70720849522e0faeb

  • SHA1

    e0432c262256d542359b3736362c1ed259915c54

  • SHA256

    203209dc760b42b540e871713f2b65210e7e7cbf815493b170722b93e4f7a58f

  • SHA512

    9266517309bd6491e4eaa24ed79edff7f37ed783957d1934c7748718d9c3d710636a36661a7f206590ba77a57d946ab852ba633ac8c645a2c35208c8fbfa9ad6

  • SSDEEP

    98304:4y6ViOKz/eToA4cUJ4xMbDGDAyFGUPn68ufhPZS:h6VFKz2ToAINP8AyFvZAh8

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

W0dvRoDKJr1YA1AA

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/fSgk0zpE

aes.plain
1
WChnTTgrDC7ySAL5+l90Cg==

Targets

    • Target

      niggacoin.exe

    • Size

      3.6MB

    • MD5

      765acfef2d7e2ef70720849522e0faeb

    • SHA1

      e0432c262256d542359b3736362c1ed259915c54

    • SHA256

      203209dc760b42b540e871713f2b65210e7e7cbf815493b170722b93e4f7a58f

    • SHA512

      9266517309bd6491e4eaa24ed79edff7f37ed783957d1934c7748718d9c3d710636a36661a7f206590ba77a57d946ab852ba633ac8c645a2c35208c8fbfa9ad6

    • SSDEEP

      98304:4y6ViOKz/eToA4cUJ4xMbDGDAyFGUPn68ufhPZS:h6VFKz2ToAINP8AyFvZAh8

    • Detect Xworm Payload

    • Detects RedTiger Stealer

    • Redtiger family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.