General

  • Target

    2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber

  • Size

    20.6MB

  • Sample

    250128-qrlyeasqfr

  • MD5

    db88155e4bce794188a61369780ba162

  • SHA1

    577efdb04544d7d6a32e212e5d0e3b1529c95577

  • SHA256

    b26d57328c89c925b195cafa44279f2648a051ba7309b0ed098ed0d335e2b296

  • SHA512

    734cfb73563308f214d3bc42f64f9dff78c35e183f47d11e4a210e438327c1b5cb563df831400aeb72dd329c0bc9bd45763a048a622482ab7b104274790f6393

  • SSDEEP

    393216:EUVeyIB6YW/oLBLxss1p15V3qKBtO0iglAlbM1UsjDAvYmgNBOGQI9Bd/zsEv:/K6YTLzs05V3/EGA2GsjcAmsMG/9DAEv

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-01-28_db88155e4bce794188a61369780ba162_darkgate_luca-stealer_magniber

    • Size

      20.6MB

    • MD5

      db88155e4bce794188a61369780ba162

    • SHA1

      577efdb04544d7d6a32e212e5d0e3b1529c95577

    • SHA256

      b26d57328c89c925b195cafa44279f2648a051ba7309b0ed098ed0d335e2b296

    • SHA512

      734cfb73563308f214d3bc42f64f9dff78c35e183f47d11e4a210e438327c1b5cb563df831400aeb72dd329c0bc9bd45763a048a622482ab7b104274790f6393

    • SSDEEP

      393216:EUVeyIB6YW/oLBLxss1p15V3qKBtO0iglAlbM1UsjDAvYmgNBOGQI9Bd/zsEv:/K6YTLzs05V3/EGA2GsjcAmsMG/9DAEv

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks