General

  • Target

    115cf5a051098e7bd964d660b0ebead30d851cdbd06886ee2d47007889abae48.unknown

  • Size

    664B

  • Sample

    241225-chb5ystpev

  • MD5

    1ab2a527d0e4bd1f76f5467d6e2ea3dc

  • SHA1

    9731d4f1fc6d6145aa9ed5243cb07b16f17d2f98

  • SHA256

    115cf5a051098e7bd964d660b0ebead30d851cdbd06886ee2d47007889abae48

  • SHA512

    2f9a7c422eade46177beff437f617d920b193c13ec4d6c8ea833a79d2523b98151bc02a79ce1bc50d8d4ed68087e3bae545ff028f0366220408a7b196f9d7976

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      115cf5a051098e7bd964d660b0ebead30d851cdbd06886ee2d47007889abae48.unknown

    • Size

      664B

    • MD5

      1ab2a527d0e4bd1f76f5467d6e2ea3dc

    • SHA1

      9731d4f1fc6d6145aa9ed5243cb07b16f17d2f98

    • SHA256

      115cf5a051098e7bd964d660b0ebead30d851cdbd06886ee2d47007889abae48

    • SHA512

      2f9a7c422eade46177beff437f617d920b193c13ec4d6c8ea833a79d2523b98151bc02a79ce1bc50d8d4ed68087e3bae545ff028f0366220408a7b196f9d7976

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks