General
-
Target
CraxsRat°v7.1cracked [RDP].zip
-
Size
259.5MB
-
Sample
250111-m2579azngp
-
MD5
c222287d1a010c086a301f789de8ea87
-
SHA1
a5999d3213ecb6ffe1c593866a384e983aa0b350
-
SHA256
2677883f2109a228a80bebbd723c70ec58e01526af5944d92627d2fcf634a3dd
-
SHA512
b2fb338af2a99d79a4b7658b3e251a13d76b23279985a043dd18136ef4816c044bf61543f31e95e77ea58fa51c61ddc7bf749462d6d0e97d85a228c8168f5e1d
-
SSDEEP
6291456:lgl+OvcaWK3Y/Eod2qQlqFbp1XfTsmgmvv7GInbBsH:l0+zLr2jMXf1gcGGKH
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
CraxsRat°v7.1cracked [RDP].zip
-
Size
259.5MB
-
MD5
c222287d1a010c086a301f789de8ea87
-
SHA1
a5999d3213ecb6ffe1c593866a384e983aa0b350
-
SHA256
2677883f2109a228a80bebbd723c70ec58e01526af5944d92627d2fcf634a3dd
-
SHA512
b2fb338af2a99d79a4b7658b3e251a13d76b23279985a043dd18136ef4816c044bf61543f31e95e77ea58fa51c61ddc7bf749462d6d0e97d85a228c8168f5e1d
-
SSDEEP
6291456:lgl+OvcaWK3Y/Eod2qQlqFbp1XfTsmgmvv7GInbBsH:l0+zLr2jMXf1gcGGKH
-
Xred family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-
Probable phishing domain
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-