Method of deployment
XDDown Downloader is a malware tool that is part of XDSpy’s arsenal. XDSpy is a hacker group that has been active since 2011. The group’s operations were detected in October 2020, targeting the region of Eastern Europe and the Balkans.
The group uses spear-phishing tactics to propagate the malware. The email’s content is updated frequently to adapt and bank off of current events such as the pandemic. The threat group attaches ZIP and RAR archives to carry the malicious LNK or PowerPoint file. In some cases the emails come without any attached files, and include only a direct download link. Once the user clicks over the link or downloads the malicious file, it initiates a corrupted script to drop XDDown on the compromised machine to a location at %APPDATA%\WINinit\WINlogon.exe. Also, persistence is achieved by exploiting a Windows registry Run key by command.
The key features of XDDown modules include:
- XDREcon scans the host, gathers technical specs and OS details, and informs the XDDown/ XDSpy command-and-control (C2) server.
- XDList hunts down files with specific file extensions (Office-related files, PDFs, and address books) in the infected machine.
- XDMonitor monitors and identifies what devices were connected to the infected host.
- XDUpload uploads files that are not identified by XDList, to the XDXpy server.
- XDLoc gathers information about nearby WiFi networks to track users’ movements, using maps of public WiFi networks.
- XDPass extracts passwords from locally installed browsers.
- Damage to the reputation as people lose confidence in the brand.
- Business disruption in terms of its income.
- Disclosure of PII and confidential documents.
- Training sessions for employees creating awareness regarding phishing scenarios.
- Deploy a spam filter.
- Deploy latest security patches and updates for systems.
- Use an antivirus software.
- Use web filters to block malicious websites.
- Encrypt all sensitive company information.
Indicators of Compromise
Old network infrastructure