General
-
Target
start.exe
-
Size
1.2MB
-
Sample
250216-qv95eayrhw
-
MD5
fd57bed035b52af3f76c38dd3734d488
-
SHA1
980b619a20a29c22c988c8da5aeefefef5ac8331
-
SHA256
ae9f91672d7669b9db7e822d9d914df15d52cd7a70a6c97751031d960a940c52
-
SHA512
76c9fa92d883a0dbd5b976eb4be768d9e679bc21f9182eee11c84890e0382240355bfc2d61597dc37f73cdae463d2b3aee2bde0210dc19a4bec87cc22a20ae1b
-
SSDEEP
24576:uuDXTIGaPhEYzUzA0JAHh4pXmqkanlqSyThu2PpCo/CJxkGI+Rz+O9j:hDjlabwz9JAHh4pXmo2RhCJnzFj
Static task
static1
Malware Config
Extracted
xworm
66.118.245.221:3333
-
Install_directory
%AppData%
-
install_file
Windows.exe
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
start.exe
-
Size
1.2MB
-
MD5
fd57bed035b52af3f76c38dd3734d488
-
SHA1
980b619a20a29c22c988c8da5aeefefef5ac8331
-
SHA256
ae9f91672d7669b9db7e822d9d914df15d52cd7a70a6c97751031d960a940c52
-
SHA512
76c9fa92d883a0dbd5b976eb4be768d9e679bc21f9182eee11c84890e0382240355bfc2d61597dc37f73cdae463d2b3aee2bde0210dc19a4bec87cc22a20ae1b
-
SSDEEP
24576:uuDXTIGaPhEYzUzA0JAHh4pXmqkanlqSyThu2PpCo/CJxkGI+Rz+O9j:hDjlabwz9JAHh4pXmo2RhCJnzFj
-
Detect Xworm Payload
-
Xred family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-