General

  • Target

    0b510380e52b3c97e7a2f227eb9ecda6a194885da74fac6630f1eb7d5ee6091f.exe

  • Size

    801KB

  • Sample

    241225-cj5tnatrhj

  • MD5

    6153a06b74491bacb664bf142b598c69

  • SHA1

    dade36a11a568e3b0b5f3e7fd44b566182702534

  • SHA256

    0b510380e52b3c97e7a2f227eb9ecda6a194885da74fac6630f1eb7d5ee6091f

  • SHA512

    bb1c20ce4b2ae5e3524e1127eca6047ab897da49d8b66e435e8d81f418dc16c7c6345887ae67c9ca7ea0f39d175eedace8dabc74be9db9ea492ca4c489ec4721

  • SSDEEP

    12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9zl6MMuj:GnsJ39LyjbJkQFMhmC+6GD99h

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

runningrat

C2

103.36.221.195

Targets

    • Target

      0b510380e52b3c97e7a2f227eb9ecda6a194885da74fac6630f1eb7d5ee6091f.exe

    • Size

      801KB

    • MD5

      6153a06b74491bacb664bf142b598c69

    • SHA1

      dade36a11a568e3b0b5f3e7fd44b566182702534

    • SHA256

      0b510380e52b3c97e7a2f227eb9ecda6a194885da74fac6630f1eb7d5ee6091f

    • SHA512

      bb1c20ce4b2ae5e3524e1127eca6047ab897da49d8b66e435e8d81f418dc16c7c6345887ae67c9ca7ea0f39d175eedace8dabc74be9db9ea492ca4c489ec4721

    • SSDEEP

      12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9zl6MMuj:GnsJ39LyjbJkQFMhmC+6GD99h

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Runningrat family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks