General

  • Target

    2024-03-27_c6a040b09d26b27b4b2e042765009868_icedid

  • Size

    2.0MB

  • Sample

    240327-wbtwzacf3s

  • MD5

    c6a040b09d26b27b4b2e042765009868

  • SHA1

    69e0aa95fdf46a52726fd0e35af5f2eca3dd7867

  • SHA256

    655fa8e045bafdd00e4e00193be6fefbd62a44e09c11b729e34497feb6e274ea

  • SHA512

    479572d5f5016d66a644f817225a98f501284ba3b39d185532c67d025fe03e2cd432573ca980133f232d5cba10a503d5df33c5afbb92b31af5b7f8e913674204

  • SSDEEP

    49152:KnsHyjtk2MYC5GD8Tq24GjdGS9hWb2J3Y2pzEBOgpjoVuQr:Knsmtk2aAEjdGSGb2Jo2Dxr

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2024-03-27_c6a040b09d26b27b4b2e042765009868_icedid

    • Size

      2.0MB

    • MD5

      c6a040b09d26b27b4b2e042765009868

    • SHA1

      69e0aa95fdf46a52726fd0e35af5f2eca3dd7867

    • SHA256

      655fa8e045bafdd00e4e00193be6fefbd62a44e09c11b729e34497feb6e274ea

    • SHA512

      479572d5f5016d66a644f817225a98f501284ba3b39d185532c67d025fe03e2cd432573ca980133f232d5cba10a503d5df33c5afbb92b31af5b7f8e913674204

    • SSDEEP

      49152:KnsHyjtk2MYC5GD8Tq24GjdGS9hWb2J3Y2pzEBOgpjoVuQr:Knsmtk2aAEjdGSGb2Jo2Dxr

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables manipulated with Fody

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks