General

  • Target

    0a7aa19b240796b21933cc872acd9c5384680a52c119ce339a19b6b15ecc3d84N.exe

  • Size

    1.6MB

  • Sample

    250101-1qm47aymcn

  • MD5

    8bc5854846987dbb5557fd5864581fb0

  • SHA1

    246f74f7703d9ca56c5c8480374d584bb8971c45

  • SHA256

    0a7aa19b240796b21933cc872acd9c5384680a52c119ce339a19b6b15ecc3d84

  • SHA512

    b5ab94002baa69de118c0677fbbc7ff15e95779fa80c5424f83a106eea3d418db17937b48e440c865f460d562d2597255266527c886a88845cd3908ea9cfb601

  • SSDEEP

    49152:snsHyjtk2MYC5GD7Zkg6Yf5/pFFFOhKMdDBY:snsmtk2acZkg6YBhFFFOhKMdW

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      0a7aa19b240796b21933cc872acd9c5384680a52c119ce339a19b6b15ecc3d84N.exe

    • Size

      1.6MB

    • MD5

      8bc5854846987dbb5557fd5864581fb0

    • SHA1

      246f74f7703d9ca56c5c8480374d584bb8971c45

    • SHA256

      0a7aa19b240796b21933cc872acd9c5384680a52c119ce339a19b6b15ecc3d84

    • SHA512

      b5ab94002baa69de118c0677fbbc7ff15e95779fa80c5424f83a106eea3d418db17937b48e440c865f460d562d2597255266527c886a88845cd3908ea9cfb601

    • SSDEEP

      49152:snsHyjtk2MYC5GD7Zkg6Yf5/pFFFOhKMdDBY:snsmtk2acZkg6YBhFFFOhKMdW

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks