General

  • Target

    1ab2a527d0e4bd1f76f5467d6e2ea3dc.bin

  • Size

    702B

  • Sample

    241226-bdl9patjgn

  • MD5

    b91637600bf43edce03916b9b27d2a01

  • SHA1

    cc8557a57784212d35bff955aa17dbad304c426c

  • SHA256

    aabf5c0476141c658a2482e16f093a173c43800b97487f4c7069cf40e5ddf657

  • SHA512

    75c222683ac58b96700b8a424e5b018230295e141939d0ec5e6cf19a1b2266a4410c07695e190713c8649c55b7e926cee7b52b1020e085aded86d6afcc741f75

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      115cf5a051098e7bd964d660b0ebead30d851cdbd06886ee2d47007889abae48.unknown

    • Size

      664B

    • MD5

      1ab2a527d0e4bd1f76f5467d6e2ea3dc

    • SHA1

      9731d4f1fc6d6145aa9ed5243cb07b16f17d2f98

    • SHA256

      115cf5a051098e7bd964d660b0ebead30d851cdbd06886ee2d47007889abae48

    • SHA512

      2f9a7c422eade46177beff437f617d920b193c13ec4d6c8ea833a79d2523b98151bc02a79ce1bc50d8d4ed68087e3bae545ff028f0366220408a7b196f9d7976

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks