General
-
Target
niggacoin.exe
-
Size
3.6MB
-
Sample
250105-ahevqsvjgt
-
MD5
765acfef2d7e2ef70720849522e0faeb
-
SHA1
e0432c262256d542359b3736362c1ed259915c54
-
SHA256
203209dc760b42b540e871713f2b65210e7e7cbf815493b170722b93e4f7a58f
-
SHA512
9266517309bd6491e4eaa24ed79edff7f37ed783957d1934c7748718d9c3d710636a36661a7f206590ba77a57d946ab852ba633ac8c645a2c35208c8fbfa9ad6
-
SSDEEP
98304:4y6ViOKz/eToA4cUJ4xMbDGDAyFGUPn68ufhPZS:h6VFKz2ToAINP8AyFvZAh8
Behavioral task
behavioral1
Sample
niggacoin.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
W0dvRoDKJr1YA1AA
-
Install_directory
%AppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/fSgk0zpE
Targets
-
-
Target
niggacoin.exe
-
Size
3.6MB
-
MD5
765acfef2d7e2ef70720849522e0faeb
-
SHA1
e0432c262256d542359b3736362c1ed259915c54
-
SHA256
203209dc760b42b540e871713f2b65210e7e7cbf815493b170722b93e4f7a58f
-
SHA512
9266517309bd6491e4eaa24ed79edff7f37ed783957d1934c7748718d9c3d710636a36661a7f206590ba77a57d946ab852ba633ac8c645a2c35208c8fbfa9ad6
-
SSDEEP
98304:4y6ViOKz/eToA4cUJ4xMbDGDAyFGUPn68ufhPZS:h6VFKz2ToAINP8AyFvZAh8
-
Detect Xworm Payload
-
Detects RedTiger Stealer
-
Redtiger family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-