General

  • Target

    grannycc.exe

  • Size

    3.1MB

  • Sample

    250215-asvc6s1php

  • MD5

    93bba25a98254755eaf3afdb7826bd31

  • SHA1

    d9a2cc89eb523886710e485b5be703d9c7c1e53d

  • SHA256

    adcb154a472177f99055a2c7cc2b203737a9a63807782de66154d85d2921cd43

  • SHA512

    9e2142bf39d3b90ff3e170876b00e591c7473dd9462428932bb26ecfb213a5435a332ac8ce601367c8ef8872aaf66100f6523803593e541f48d5a027e41ef264

  • SSDEEP

    49152:5nsHyjtk2MYC5GDSKOR8wgkLCEUMi1M8PPQg8N6ToOTCTDey7/t7+dxwYSQH:5nsmtk2aRtuwncM8UNla0T0SQ

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

xworm

Version

5.0

C2

noipedd.ddns.net:1193

Mutex

8V29vmvrMp98QQ8X

Attributes
  • Install_directory

    %AppData%

  • install_file

    qqwgjfggjd.exe

aes.plain

Targets

    • Target

      grannycc.exe

    • Size

      3.1MB

    • MD5

      93bba25a98254755eaf3afdb7826bd31

    • SHA1

      d9a2cc89eb523886710e485b5be703d9c7c1e53d

    • SHA256

      adcb154a472177f99055a2c7cc2b203737a9a63807782de66154d85d2921cd43

    • SHA512

      9e2142bf39d3b90ff3e170876b00e591c7473dd9462428932bb26ecfb213a5435a332ac8ce601367c8ef8872aaf66100f6523803593e541f48d5a027e41ef264

    • SSDEEP

      49152:5nsHyjtk2MYC5GDSKOR8wgkLCEUMi1M8PPQg8N6ToOTCTDey7/t7+dxwYSQH:5nsmtk2aRtuwncM8UNla0T0SQ

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks