General

  • Target

    0x0008000000016c56-20.dat

  • Size

    939KB

  • Sample

    250226-z55r4sttaz

  • MD5

    758b53a6eef2a3a811f3271e92c72e2f

  • SHA1

    a813953f2b23cb5fae59b2248bafa6e16c80e9ef

  • SHA256

    183ac70aa719ee42293766685f5777a4e8bbf5e3c29dd584064779849e1c874b

  • SHA512

    479c789815e185d9985d42d528e2bb8f677d3dfcbef5dd7b80fa74a3b981928cdf2e9f6ee049acdaa67832ccc82f7c9d9835bb370cac2163e56d4cd45d1d7eb0

  • SSDEEP

    12288:vMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9N9or++FxY:vnsJ39LyjbJkQFMhmC+6GD97Kg

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

xworm

C2

209.50.250.24:4562

Attributes
  • install_file

    USB.exe

Targets

    • Target

      0x0008000000016c56-20.dat

    • Size

      939KB

    • MD5

      758b53a6eef2a3a811f3271e92c72e2f

    • SHA1

      a813953f2b23cb5fae59b2248bafa6e16c80e9ef

    • SHA256

      183ac70aa719ee42293766685f5777a4e8bbf5e3c29dd584064779849e1c874b

    • SHA512

      479c789815e185d9985d42d528e2bb8f677d3dfcbef5dd7b80fa74a3b981928cdf2e9f6ee049acdaa67832ccc82f7c9d9835bb370cac2163e56d4cd45d1d7eb0

    • SSDEEP

      12288:vMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9N9or++FxY:vnsJ39LyjbJkQFMhmC+6GD97Kg

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks