General
-
Target
g.exe
-
Size
106KB
-
Sample
250207-sa3wpsvpf1
-
MD5
f52a1ae522be2d339ac6a8272780ad38
-
SHA1
cf6d8643f690eafe02c1e29861ab687cf8270ca9
-
SHA256
68178b1f58efb2930e9153ec8697f09bc35bc479314adb0db8f199e0016fe749
-
SHA512
44e3d79dc7f128c7548a255674827b948f78889d1d063e90b0e9a8fc4cc4463aec50176c577888d1c5034f80a02e7440110c72d2fb47dbd0368a932f5caa0168
-
SSDEEP
1536:xxuiX2rv5jlwpxJbjrHbgvSAtdHxYSF739z98sW/do9dlzpvSvQfJZ:z4elzHbcxtxxYqr9pI4jvSvQfr
Static task
static1
Behavioral task
behavioral1
Sample
g.exe
Resource
win11-20241007-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
g.exe
-
Size
106KB
-
MD5
f52a1ae522be2d339ac6a8272780ad38
-
SHA1
cf6d8643f690eafe02c1e29861ab687cf8270ca9
-
SHA256
68178b1f58efb2930e9153ec8697f09bc35bc479314adb0db8f199e0016fe749
-
SHA512
44e3d79dc7f128c7548a255674827b948f78889d1d063e90b0e9a8fc4cc4463aec50176c577888d1c5034f80a02e7440110c72d2fb47dbd0368a932f5caa0168
-
SSDEEP
1536:xxuiX2rv5jlwpxJbjrHbgvSAtdHxYSF739z98sW/do9dlzpvSvQfJZ:z4elzHbcxtxxYqr9pI4jvSvQfr
-
Modifies Windows Defender Real-time Protection settings
-
UAC bypass
-
Xred family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify Tools
3Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
7Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
4System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1