General

  • Target

    aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558.exe

  • Size

    796KB

  • Sample

    250213-grcv3avkfz

  • MD5

    40ee1549e8c99a64265e217620aefc9a

  • SHA1

    bd75e242951197e608dfb169166f30c79c48b4e8

  • SHA256

    aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558

  • SHA512

    031481f173ed7f05ad54b84135ad3a01ea21e818a1ce41f6129f14df22dfa41db9b42ed67b91f93eafbc8d3fd34c1568e321f1c93f10585ee3df22f20f83d938

  • SSDEEP

    12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Z1mG1Bj:6nsJ39LyjbJkQFMhmC+6GD9TXL

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:5000

103.68.109.212:5000

Mutex

140AzOmUwpFRPV8g

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7929370892:AAGwrX5TeyxQidZdAEm_Z6-CDvPUOQzVY1M

aes.plain

Targets

    • Target

      aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558.exe

    • Size

      796KB

    • MD5

      40ee1549e8c99a64265e217620aefc9a

    • SHA1

      bd75e242951197e608dfb169166f30c79c48b4e8

    • SHA256

      aaf94802ec4fd06c7498021cdda4527dd3b51340648627f8a47a09778b863558

    • SHA512

      031481f173ed7f05ad54b84135ad3a01ea21e818a1ce41f6129f14df22dfa41db9b42ed67b91f93eafbc8d3fd34c1568e321f1c93f10585ee3df22f20f83d938

    • SSDEEP

      12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Z1mG1Bj:6nsJ39LyjbJkQFMhmC+6GD9TXL

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks