General
-
Target
Spyroid-Rat-V8.6.7z
-
Size
219.6MB
-
Sample
250220-p35dfsvqgq
-
MD5
166c07764c74f4bf0ea484093da2b645
-
SHA1
38dd3d328559a82eb375dd9f4d35d2725fd101ed
-
SHA256
aa7581a6b02fbc71d1d9eea9160b8de7ccca647209f3c1f36c03634196c6804f
-
SHA512
e925ca1edd21203a3b263d7708cdbb4da3dbe17c5d5832dc7d2d9047a6f86fe97d2d48b59d24693dac613a9355c7c0ffa8b4bcebf29b1e2ff627e19d28ef7176
-
SSDEEP
6291456:WH5oV9YpQ4gHbtw0ek3lvb+kAXohMXlb23dO5H8QE/FLW:jV9aQ4gHbeWlvb+kAXnXM31Py
Behavioral task
behavioral1
Sample
Spyroid-Rat-V8.6.7z
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
blacksudo.duckdns.org:7000
-
Install_directory
%AppData%
-
install_file
msedge.exe
-
telegram
https://api.telegram.org/bot6984284905:AAF5YUF579l1YzOin3UAD9mHnCAXXojq1dI/sendMessage?chat_id=5205734226
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
Spyroid-Rat-V8.6.7z
-
Size
219.6MB
-
MD5
166c07764c74f4bf0ea484093da2b645
-
SHA1
38dd3d328559a82eb375dd9f4d35d2725fd101ed
-
SHA256
aa7581a6b02fbc71d1d9eea9160b8de7ccca647209f3c1f36c03634196c6804f
-
SHA512
e925ca1edd21203a3b263d7708cdbb4da3dbe17c5d5832dc7d2d9047a6f86fe97d2d48b59d24693dac613a9355c7c0ffa8b4bcebf29b1e2ff627e19d28ef7176
-
SSDEEP
6291456:WH5oV9YpQ4gHbtw0ek3lvb+kAXohMXlb23dO5H8QE/FLW:jV9aQ4gHbeWlvb+kAXnXM31Py
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3