General

  • Target

    1e9ca01052b0b4acbc82b71eb7ce1445e7356eeb9404d529a6c1b47b181274f6.exe

  • Size

    744KB

  • Sample

    250213-c3bpxs1qdj

  • MD5

    9fced1c3eab7b34e214925e885a25bb8

  • SHA1

    e6daaf0725df45794e1e8e654420ac2ea995694b

  • SHA256

    1e9ca01052b0b4acbc82b71eb7ce1445e7356eeb9404d529a6c1b47b181274f6

  • SHA512

    d92f06c78123709755108e3907a2e3f59f204135eb50a1c5f9929373099b5a008c8b5d16b26e506dd143fdf9a7b2caeea46aa81b630b1e743558cb8cdef3e47b

  • SSDEEP

    12288:vMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9QU:vnsJ39LyjbJkQFMhmC+6GD93

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      1e9ca01052b0b4acbc82b71eb7ce1445e7356eeb9404d529a6c1b47b181274f6.exe

    • Size

      744KB

    • MD5

      9fced1c3eab7b34e214925e885a25bb8

    • SHA1

      e6daaf0725df45794e1e8e654420ac2ea995694b

    • SHA256

      1e9ca01052b0b4acbc82b71eb7ce1445e7356eeb9404d529a6c1b47b181274f6

    • SHA512

      d92f06c78123709755108e3907a2e3f59f204135eb50a1c5f9929373099b5a008c8b5d16b26e506dd143fdf9a7b2caeea46aa81b630b1e743558cb8cdef3e47b

    • SSDEEP

      12288:vMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9QU:vnsJ39LyjbJkQFMhmC+6GD93

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks