General

  • Target

    0bbe93a978862e8499f795575fe9eb1d.vbs

  • Size

    631B

  • Sample

    250201-ta8yds1lfr

  • MD5

    0bbe93a978862e8499f795575fe9eb1d

  • SHA1

    995628d7e88ecf1815c7137967fe1a26fe6e2ded

  • SHA256

    c50928dd7e0138f769ffdc30d0be023142ab3765371ec5f046c6389801840384

  • SHA512

    2b05ad6c70b8f72d917eb239ac3efd3c366663218110000714b1dc499e75dec40529c4480d1d58f9854bd6210a09d1024996ed0df13570db8e05a0cb87d6ad47

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      0bbe93a978862e8499f795575fe9eb1d.vbs

    • Size

      631B

    • MD5

      0bbe93a978862e8499f795575fe9eb1d

    • SHA1

      995628d7e88ecf1815c7137967fe1a26fe6e2ded

    • SHA256

      c50928dd7e0138f769ffdc30d0be023142ab3765371ec5f046c6389801840384

    • SHA512

      2b05ad6c70b8f72d917eb239ac3efd3c366663218110000714b1dc499e75dec40529c4480d1d58f9854bd6210a09d1024996ed0df13570db8e05a0cb87d6ad47

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks