General
-
Target
aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558.exe
-
Size
796KB
-
Sample
250213-grcv3avkfz
-
MD5
40ee1549e8c99a64265e217620aefc9a
-
SHA1
bd75e242951197e608dfb169166f30c79c48b4e8
-
SHA256
aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558
-
SHA512
031481f173ed7f05ad54b84135ad3a01ea21e818a1ce41f6129f14df22dfa41db9b42ed67b91f93eafbc8d3fd34c1568e321f1c93f10585ee3df22f20f83d938
-
SSDEEP
12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Z1mG1Bj:6nsJ39LyjbJkQFMhmC+6GD9TXL
Behavioral task
behavioral1
Sample
aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558.exe
Resource
win7-20240903-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
xworm
5.0
127.0.0.1:5000
103.68.109.212:5000
140AzOmUwpFRPV8g
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7929370892:AAGwrX5TeyxQidZdAEm_Z6-CDvPUOQzVY1M
Targets
-
-
Target
aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558.exe
-
Size
796KB
-
MD5
40ee1549e8c99a64265e217620aefc9a
-
SHA1
bd75e242951197e608dfb169166f30c79c48b4e8
-
SHA256
aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558
-
SHA512
031481f173ed7f05ad54b84135ad3a01ea21e818a1ce41f6129f14df22dfa41db9b42ed67b91f93eafbc8d3fd34c1568e321f1c93f10585ee3df22f20f83d938
-
SSDEEP
12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Z1mG1Bj:6nsJ39LyjbJkQFMhmC+6GD9TXL
-
Detect Xworm Payload
-
Xred family
-
Xworm family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1