General

  • Target

    2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber

  • Size

    12.6MB

  • Sample

    250103-xkt4rs1kej

  • MD5

    080cb568ad618c933f5f93d628f3d1f7

  • SHA1

    fa8a2680b0bf53db66c2e7a4a067b2c7188d92c8

  • SHA256

    ba5bda3a3bae477c9975bedcbbbc95d0d0f974d15363efe10c4c96b41a62b68e

  • SHA512

    9744d1af4eb85280947d97fd40d3f2eaca91e2b59d74eaf4733de0760a609798e6028557fa9515317c43df08e8c8fac9d20e321dfaf223c0eec340bcc495d082

  • SSDEEP

    196608:58upg+GYCkf4qg4h/FQvGy8upg+GYCkf4qg4h/FQvGvpFvqcA:5tgb4d/SvGytgb4d/SvGj

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-01-03_080cb568ad618c933f5f93d628f3d1f7_luca-stealer_magniber

    • Size

      12.6MB

    • MD5

      080cb568ad618c933f5f93d628f3d1f7

    • SHA1

      fa8a2680b0bf53db66c2e7a4a067b2c7188d92c8

    • SHA256

      ba5bda3a3bae477c9975bedcbbbc95d0d0f974d15363efe10c4c96b41a62b68e

    • SHA512

      9744d1af4eb85280947d97fd40d3f2eaca91e2b59d74eaf4733de0760a609798e6028557fa9515317c43df08e8c8fac9d20e321dfaf223c0eec340bcc495d082

    • SSDEEP

      196608:58upg+GYCkf4qg4h/FQvGy8upg+GYCkf4qg4h/FQvGvpFvqcA:5tgb4d/SvGytgb4d/SvGj

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Warzone RAT payload

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks