General

  • Target

    MicrosoftEdgeWebview2Setup.exe

  • Size

    2.3MB

  • Sample

    250206-naz3lasrhw

  • MD5

    a61250a4ca592ca4df63a735a9facc0e

  • SHA1

    ae06a5cc58eddec055c63c529e392afee2821854

  • SHA256

    a280044f416e832e17c5525334ed096f4714f0450ea9eb1526eac9bbbfe9b541

  • SHA512

    4177c9c25450abc7b9f21ce3976f8f634dfb698ab0f70a728ccf401d84748732455c7b89e3b1fb2813f42c3246f3d1cf4d74f41460b064647e2494bec73e2023

  • SSDEEP

    49152:ZnsHyjtk2MYC5GDriEf3ON2k8vaM9GVkMSC2LeWhRXt1DlZFuXyrRJN:Znsmtk2aei9z8vaM0yyIeC5DpRJN

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      MicrosoftEdgeWebview2Setup.exe

    • Size

      2.3MB

    • MD5

      a61250a4ca592ca4df63a735a9facc0e

    • SHA1

      ae06a5cc58eddec055c63c529e392afee2821854

    • SHA256

      a280044f416e832e17c5525334ed096f4714f0450ea9eb1526eac9bbbfe9b541

    • SHA512

      4177c9c25450abc7b9f21ce3976f8f634dfb698ab0f70a728ccf401d84748732455c7b89e3b1fb2813f42c3246f3d1cf4d74f41460b064647e2494bec73e2023

    • SSDEEP

      49152:ZnsHyjtk2MYC5GDriEf3ON2k8vaM9GVkMSC2LeWhRXt1DlZFuXyrRJN:Znsmtk2aei9z8vaM0yyIeC5DpRJN

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks