Resubmissions

22/01/2025, 15:50 UTC

250122-s99tasvlcp 10

22/01/2025, 15:46 UTC

250122-s7peksvkbr 10

22/01/2025, 15:45 UTC

250122-s7aanatkgx 10

22/01/2025, 14:49 UTC

250122-r7c6wa1ncx 10

General

  • Target

    TDMenu_x64.exe

  • Size

    6.4MB

  • Sample

    250122-s7peksvkbr

  • MD5

    3f9d8993daa6e07221f9a12eaa011ca6

  • SHA1

    a33290d94fb3bba06337b7b847d971b1a8fd6110

  • SHA256

    109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79

  • SHA512

    ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0

  • SSDEEP

    98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT

Malware Config

Extracted

Family

xworm

C2

23.27.201.57:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    DirectX End-User Runtime.exe

Extracted

Family

redline

Botnet

godseye3-01-25

C2

23.27.201.57:62529

Targets

    • Target

      TDMenu_x64.exe

    • Size

      6.4MB

    • MD5

      3f9d8993daa6e07221f9a12eaa011ca6

    • SHA1

      a33290d94fb3bba06337b7b847d971b1a8fd6110

    • SHA256

      109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79

    • SHA512

      ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0

    • SSDEEP

      98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT

    • Detect Xworm Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Xmrig family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.