General

  • Target

    ggggggggggg.txt

  • Size

    181B

  • Sample

    241204-wev87sypfn

  • MD5

    ddf5e50a6e91ccc0c9c218e433cefdbe

  • SHA1

    2413a1e0f510ee401da0f5c00879df2b204fc915

  • SHA256

    b8e3aa8d2afa51793ea4651315e8909c5d8860145f50a2de416ae657d76fef0d

  • SHA512

    30cd99d47b7c050ba081cb35bb50f0becf9fde159ca595ffa12e5864e4e074eaaa5a69ebb48d42f8b9eadf26621f9e033acc22805df910443c61118c98e8bda9

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      ggggggggggg.txt

    • Size

      181B

    • MD5

      ddf5e50a6e91ccc0c9c218e433cefdbe

    • SHA1

      2413a1e0f510ee401da0f5c00879df2b204fc915

    • SHA256

      b8e3aa8d2afa51793ea4651315e8909c5d8860145f50a2de416ae657d76fef0d

    • SHA512

      30cd99d47b7c050ba081cb35bb50f0becf9fde159ca595ffa12e5864e4e074eaaa5a69ebb48d42f8b9eadf26621f9e033acc22805df910443c61118c98e8bda9

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks