General

  • Target

    2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber

  • Size

    20.6MB

  • Sample

    250201-nyxx5sspdr

  • MD5

    4b87b7448d0aaf1611dd75168e05f3fb

  • SHA1

    48366ee5d9504ea32cca7280ca355031b2d892e1

  • SHA256

    3c3d7e16843be0a6e741a93f8b6e05ac39f5cb716c2f6a3efe6131c207bd19fe

  • SHA512

    e6e61a69fb4abf79c05a8fb6693dee51439ecfcc26965417d5614ec275c8d9d68702eccb29e053a20f3e01bd39872bd628626dcf4b1c23bbe375cc69ab2f8f2b

  • SSDEEP

    393216:EUVeyIB6YW/oLBLxss1p15V3qKBtO0iglAlbM1UsjDAvYmgNBOGQI9Bd/zsE9:/K6YTLzs05V3/EGA2GsjcAmsMG/9DAE9

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-02-01_4b87b7448d0aaf1611dd75168e05f3fb_darkgate_luca-stealer_magniber

    • Size

      20.6MB

    • MD5

      4b87b7448d0aaf1611dd75168e05f3fb

    • SHA1

      48366ee5d9504ea32cca7280ca355031b2d892e1

    • SHA256

      3c3d7e16843be0a6e741a93f8b6e05ac39f5cb716c2f6a3efe6131c207bd19fe

    • SHA512

      e6e61a69fb4abf79c05a8fb6693dee51439ecfcc26965417d5614ec275c8d9d68702eccb29e053a20f3e01bd39872bd628626dcf4b1c23bbe375cc69ab2f8f2b

    • SSDEEP

      393216:EUVeyIB6YW/oLBLxss1p15V3qKBtO0iglAlbM1UsjDAvYmgNBOGQI9Bd/zsE9:/K6YTLzs05V3/EGA2GsjcAmsMG/9DAE9

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks