General

  • Target

    91d10089fdb8b6f9aa6a51c6f9b494ca751e117de909d5e38e3e185bb665d75a

  • Size

    821KB

  • Sample

    241220-d5rplayjdz

  • MD5

    787709d6e539595f98261ba53a1b6a38

  • SHA1

    5aa7c7c9ad1bab83a325bd837d8986979738036d

  • SHA256

    91d10089fdb8b6f9aa6a51c6f9b494ca751e117de909d5e38e3e185bb665d75a

  • SHA512

    a06fc6dd142d60254bf361981f50a292ebd8ba8bf3be9188d2e25891c0d39926bbad0c40c4d909a468eebf78cd9cf8cdfd22d0c10cacd8d5fabf97a96ddc4945

  • SSDEEP

    12288:9pJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9dhWNUMS9:DJ39LyjbJkQFMhmC+6GD9HVn9

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      91d10089fdb8b6f9aa6a51c6f9b494ca751e117de909d5e38e3e185bb665d75a

    • Size

      821KB

    • MD5

      787709d6e539595f98261ba53a1b6a38

    • SHA1

      5aa7c7c9ad1bab83a325bd837d8986979738036d

    • SHA256

      91d10089fdb8b6f9aa6a51c6f9b494ca751e117de909d5e38e3e185bb665d75a

    • SHA512

      a06fc6dd142d60254bf361981f50a292ebd8ba8bf3be9188d2e25891c0d39926bbad0c40c4d909a468eebf78cd9cf8cdfd22d0c10cacd8d5fabf97a96ddc4945

    • SSDEEP

      12288:9pJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9dhWNUMS9:DJ39LyjbJkQFMhmC+6GD9HVn9

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks