General

  • Target

    XWorm_V5.6 (1).rar

  • Size

    21.3MB

  • Sample

    250123-q2n6hssrhp

  • MD5

    644d9061897fdd38b6c0732b8cb69be3

  • SHA1

    153a1359ea82878d4ecda8ab132faf778d4c8148

  • SHA256

    2caf7c96d8891b799082f6406657817ec7cffd82e54d5a44d9d4f6b82ff8ea32

  • SHA512

    d9a350d4df1174095912811787a8f93f9bac56820d09024964175684f64cd04799b1cc2b47a2253e95b2f3ac7751712b22c5be13bab1c617272dcab42f21cfd7

  • SSDEEP

    393216:jyaudJe35+5JgXIIZR866vU4pMKi5HfApb/PpvQAm2qF3Eozm4pWL0avp:jyVdo35cJg4IZS66lSb5/AptHwE8FWHB

Malware Config

Extracted

Family

xworm

C2

simply-exotic.gl.at.ply.gg:27183

Attributes
  • Install_directory

    %Temp%

  • install_file

    Windows.exe

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      XWorm_V5.6 (1).rar

    • Size

      21.3MB

    • MD5

      644d9061897fdd38b6c0732b8cb69be3

    • SHA1

      153a1359ea82878d4ecda8ab132faf778d4c8148

    • SHA256

      2caf7c96d8891b799082f6406657817ec7cffd82e54d5a44d9d4f6b82ff8ea32

    • SHA512

      d9a350d4df1174095912811787a8f93f9bac56820d09024964175684f64cd04799b1cc2b47a2253e95b2f3ac7751712b22c5be13bab1c617272dcab42f21cfd7

    • SSDEEP

      393216:jyaudJe35+5JgXIIZR866vU4pMKi5HfApb/PpvQAm2qF3Eozm4pWL0avp:jyVdo35cJg4IZS66lSb5/AptHwE8FWHB

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks