General

  • Target

    aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe

  • Size

    899KB

  • Sample

    241201-dz43qsvrb1

  • MD5

    66bdd4395672267e01f4dfdc12bfb140

  • SHA1

    bc6e038dd193b34a155c53f8eea8eaa5c1adf661

  • SHA256

    aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612

  • SHA512

    c2eb33bbd03727eb1692b80efc02cc7dcd250b74f6d5b181b1b0f57bc60b421740116c5d5e2caec59796fbbb1e46de3422f09a4a932988ba7be46a085cad70f0

  • SSDEEP

    12288:Aaxr7vr7fYnPHv3jz/jDnTnbPr7Hf/TLzAHr3fP37bv/4wDvbwt2ThTA0eOzkv4d:Aad7PThXJkQFMhmC+6GD9Yuu1OUjezCu

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Targets

    • Target

      aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612N.exe

    • Size

      899KB

    • MD5

      66bdd4395672267e01f4dfdc12bfb140

    • SHA1

      bc6e038dd193b34a155c53f8eea8eaa5c1adf661

    • SHA256

      aaa3be69951ce3c7ecfd3b8fcbcabce1a3dfd7286842b29561c6bfe253c89612

    • SHA512

      c2eb33bbd03727eb1692b80efc02cc7dcd250b74f6d5b181b1b0f57bc60b421740116c5d5e2caec59796fbbb1e46de3422f09a4a932988ba7be46a085cad70f0

    • SSDEEP

      12288:Aaxr7vr7fYnPHv3jz/jDnTnbPr7Hf/TLzAHr3fP37bv/4wDvbwt2ThTA0eOzkv4d:Aad7PThXJkQFMhmC+6GD9Yuu1OUjezCu

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Bdaejec family

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks