General

  • Target

    niggacoin.exe

  • Size

    3.6MB

  • Sample

    250105-ahevqsvjgt

  • MD5

    765acfef2d7e2ef70720849522e0faeb

  • SHA1

    e0432c262256d542359b3736362c1ed259915c54

  • SHA256

    203209dc760b42b540e871713f2b65210e7e7cbf815493b170722b93e4f7a58f

  • SHA512

    9266517309bd6491e4eaa24ed79edff7f37ed783957d1934c7748718d9c3d710636a36661a7f206590ba77a57d946ab852ba633ac8c645a2c35208c8fbfa9ad6

  • SSDEEP

    98304:4y6ViOKz/eToA4cUJ4xMbDGDAyFGUPn68ufhPZS:h6VFKz2ToAINP8AyFvZAh8

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

W0dvRoDKJr1YA1AA

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/fSgk0zpE

aes.plain

Targets

    • Target

      niggacoin.exe

    • Size

      3.6MB

    • MD5

      765acfef2d7e2ef70720849522e0faeb

    • SHA1

      e0432c262256d542359b3736362c1ed259915c54

    • SHA256

      203209dc760b42b540e871713f2b65210e7e7cbf815493b170722b93e4f7a58f

    • SHA512

      9266517309bd6491e4eaa24ed79edff7f37ed783957d1934c7748718d9c3d710636a36661a7f206590ba77a57d946ab852ba633ac8c645a2c35208c8fbfa9ad6

    • SSDEEP

      98304:4y6ViOKz/eToA4cUJ4xMbDGDAyFGUPn68ufhPZS:h6VFKz2ToAINP8AyFvZAh8

    • Detect Xworm Payload

    • Detects RedTiger Stealer

    • Redtiger family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks