General

  • Target

    66fccea15a5cf5c0893f0529156e3d59fbd88f992366a03606346cc35047f769N.exe

  • Size

    9.7MB

  • Sample

    241222-fn8mwsvmen

  • MD5

    fc76cc73d03473b15ebd3c8d10178690

  • SHA1

    1b80580e5e4a48546d1fae6a606731ed767370b1

  • SHA256

    66fccea15a5cf5c0893f0529156e3d59fbd88f992366a03606346cc35047f769

  • SHA512

    2b5305a28a9db127d971b1511de7ac43c94eccdeb65b51fad1ad15f7250903db5564a999c6c6948a0f0dbdf4326b12d5bfa4d7d4a801d5420e95e8cefa960e12

  • SSDEEP

    49152:GX4ccCjDJiYu7sCJK0G6cfE11tCn+Tql12W88EDH9wm1n77BdEde9SW+iIiJHbQp:G6UZu5G6cf6M+Nb8ETBjwS

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

104.219.215.160:4449

104.219.215.160:8008

Mutex

jjzxklegwjqz

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      66fccea15a5cf5c0893f0529156e3d59fbd88f992366a03606346cc35047f769N.exe

    • Size

      9.7MB

    • MD5

      fc76cc73d03473b15ebd3c8d10178690

    • SHA1

      1b80580e5e4a48546d1fae6a606731ed767370b1

    • SHA256

      66fccea15a5cf5c0893f0529156e3d59fbd88f992366a03606346cc35047f769

    • SHA512

      2b5305a28a9db127d971b1511de7ac43c94eccdeb65b51fad1ad15f7250903db5564a999c6c6948a0f0dbdf4326b12d5bfa4d7d4a801d5420e95e8cefa960e12

    • SSDEEP

      49152:GX4ccCjDJiYu7sCJK0G6cfE11tCn+Tql12W88EDH9wm1n77BdEde9SW+iIiJHbQp:G6UZu5G6cf6M+Nb8ETBjwS

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Async RAT payload

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks