General

  • Target

    b6035f08ad42c6b6a1eb5485b6f37249_JaffaCakes118

  • Size

    7.3MB

  • Sample

    241202-bcfera1lds

  • MD5

    b6035f08ad42c6b6a1eb5485b6f37249

  • SHA1

    fbc646e3cfb9660d35b64c971a79d8e5ae96af6e

  • SHA256

    3cb9a6df3ff558af97fc1168ca354a86ef572767e20de577b4e875555468717e

  • SHA512

    0be632514e30c7917685154c904744a57395e4cbb497c41ad554fbb94af8e1650b636604c25bbdb438b4996fe642db7eebee605c6af46478c2853f2a02aea645

  • SSDEEP

    196608:xlzLq78hY37c4/O/Jk875X+n3teA1tSHj/W9:xlzLH+A4GhkyX+n3temtSD/W9

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      mumu_setup/MuMuInstaller_1.1.0.4_nochannel_zh-Hans_1573633675.exe

    • Size

      8.1MB

    • MD5

      59fbad21d1876b0a47d918dafd4271b3

    • SHA1

      e7e889799306ee117b3d1e77b14df88508197ff9

    • SHA256

      b417c9ef633dcf57e16186ede03ef1636ac741e6b3f8fdcf73cec9755aed3426

    • SHA512

      581352e99aaa031a93dd64df62cf95f5f3d845a7945856ec435dc9b7e5746a4a81569db7ec9619f2dd5c2fb21b607e2db03471daf5d3909407f28b54c6d060c3

    • SSDEEP

      196608:xLCqHWw3BW8pAh4KPL+BObplNwgI5Jqz/8t:xV20BW8pWPMOdwj+8t

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks