General
-
Target
8b5b671cb9f8d33234668725f922c1910ffa33dadc671545e9fa709e07de2302
-
Size
918KB
-
Sample
250407-c2nm4ayjw9
-
MD5
cea96e9e6b56352a2c57e5c245af34be
-
SHA1
3fce07cea954e17818567a909334272da285ea1e
-
SHA256
8b5b671cb9f8d33234668725f922c1910ffa33dadc671545e9fa709e07de2302
-
SHA512
5cc9f57b1ca78814adf3cf40ca7a47d7a1d1243a5e44061c1dc1ad0064556538f01cca4866778af84a9ad58e1d5acccb84639b0968ce0b8e813fe5178f6e2c5f
-
SSDEEP
24576:zuxKLmnf8Iq1Cl899GfAEm37o71EF41f8pvmDHjB0PIpeVjlbKC:KxTEIE2899GfAEQj21f8pvm7oIpeP
Static task
static1
Malware Config
Extracted
xworm
5.0
204.10.161.147:7081
XoFHv1TT4hWErxRo
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
redline
success
204.10.161.147:7082
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
204.10.161.147:5009
ihdiqhrlparelebtcw
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe
-
Size
1.4MB
-
MD5
90dc7c1dea8a6e2c03fedc9db60a1b5a
-
SHA1
1add1bc885460dd045c7241e3385af2aa1d2c521
-
SHA256
a52110ba312a9500399c954fdb31a54288e2ab7b1f44b77adcb6864575460d8f
-
SHA512
834d34798067448ba3d5683625eb0c01cd170a6decbfcbccf470795af45cade6eb1924a3929e64bf7d5c60eab53dc8694d66cce1e405e770e812d257266ad8a4
-
SSDEEP
24576:8u6J33O0c+JY5UZ+XC0kGso6Fa7KOf3sGJtaRd/7zXgQKFKncbTEPVbxxgWY:mu0c++OCvkGs9Fa7KUEDjLkRbTAVbxhY
-
Asyncrat family
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Xworm family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2