General

  • Target

    8177f4d116cee11788e921284b9f7a261b3f259bb9c70cfb24443c241e6eee67.exe

  • Size

    2.9MB

  • Sample

    250116-zjt4gsyqak

  • MD5

    a9c45eef2508945daa77b877d1f33914

  • SHA1

    5b997d8928a08fcc31e1b36d06a8cfb9031455eb

  • SHA256

    8177f4d116cee11788e921284b9f7a261b3f259bb9c70cfb24443c241e6eee67

  • SHA512

    0f8415d8418184ccfe8ff323d29dc2b518f7c5c408ad1c920d32c7242cd2e1487ed846573a9d809b534fb5f6aff048398a908132b597b94af9b5e0c5636f8802

  • SSDEEP

    49152:RnsHyjtk2MYC5GDiYBnsHyjtk2MYC5GDTYdnsHyjtk2MYC5GD6Y7:Rnsmtk2a0Bnsmtk2andnsmtk2ao7

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      8177f4d116cee11788e921284b9f7a261b3f259bb9c70cfb24443c241e6eee67.exe

    • Size

      2.9MB

    • MD5

      a9c45eef2508945daa77b877d1f33914

    • SHA1

      5b997d8928a08fcc31e1b36d06a8cfb9031455eb

    • SHA256

      8177f4d116cee11788e921284b9f7a261b3f259bb9c70cfb24443c241e6eee67

    • SHA512

      0f8415d8418184ccfe8ff323d29dc2b518f7c5c408ad1c920d32c7242cd2e1487ed846573a9d809b534fb5f6aff048398a908132b597b94af9b5e0c5636f8802

    • SSDEEP

      49152:RnsHyjtk2MYC5GDiYBnsHyjtk2MYC5GDTYdnsHyjtk2MYC5GD6Y7:Rnsmtk2a0Bnsmtk2andnsmtk2ao7

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks