General
-
Target
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe
-
Size
2.0MB
-
Sample
240926-sl63hateqm
-
MD5
c01fd295e1eb843cd35f639a9bbb9b90
-
SHA1
171baf8a214403dce4234701b7ba31b5980710ff
-
SHA256
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812
-
SHA512
a8adb083200caa6c8cf3504510000dacf3eedac109f6b8311dd8e4d9f38392aab33465dc24593dc2d19baf87ee69006c6787f42047426e9b97020972eda558be
-
SSDEEP
24576:KnsJ39LyjbJkQFMhmC+6GD9oOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNBn:KnsHyjtk2MYC5GDXHPkVOBTKt
Static task
static1
Behavioral task
behavioral1
Sample
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe
Resource
win7-20240708-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812N.exe
-
Size
2.0MB
-
MD5
c01fd295e1eb843cd35f639a9bbb9b90
-
SHA1
171baf8a214403dce4234701b7ba31b5980710ff
-
SHA256
bc538c3b64913abfacbd75ce5f26029a38f9be95ad31311ee3740a48cf702812
-
SHA512
a8adb083200caa6c8cf3504510000dacf3eedac109f6b8311dd8e4d9f38392aab33465dc24593dc2d19baf87ee69006c6787f42047426e9b97020972eda558be
-
SSDEEP
24576:KnsJ39LyjbJkQFMhmC+6GD9oOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNBn:KnsHyjtk2MYC5GDXHPkVOBTKt
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2