General

  • Target

    d3e8e9580909bc27dff8729c238b041ae8df92b5ac014a9ff263b8ae5d61f520N.exe

  • Size

    1.6MB

  • Sample

    250215-znnr9stqbs

  • MD5

    fcc64066841bc611877a15d6bedd5d70

  • SHA1

    946edd5a306bddc787f51047044b7ff363419fdc

  • SHA256

    d3e8e9580909bc27dff8729c238b041ae8df92b5ac014a9ff263b8ae5d61f520

  • SHA512

    425dad1e3120dad76249729a37db4e150403888f74dc3534ebea002a2755a5b3369081770305ee5654326e8dfb41b8253c635d34bf13b57c0c5df3f16b11ec5c

  • SSDEEP

    24576:1nsJ39LyjbJkQFMhmC+6GD9LaHGvMCrrjSnyIQ8+ekGA8PSmMrEH7R:1nsHyjtk2MYC5GD9fvLjlIQxe5S6

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      d3e8e9580909bc27dff8729c238b041ae8df92b5ac014a9ff263b8ae5d61f520N.exe

    • Size

      1.6MB

    • MD5

      fcc64066841bc611877a15d6bedd5d70

    • SHA1

      946edd5a306bddc787f51047044b7ff363419fdc

    • SHA256

      d3e8e9580909bc27dff8729c238b041ae8df92b5ac014a9ff263b8ae5d61f520

    • SHA512

      425dad1e3120dad76249729a37db4e150403888f74dc3534ebea002a2755a5b3369081770305ee5654326e8dfb41b8253c635d34bf13b57c0c5df3f16b11ec5c

    • SSDEEP

      24576:1nsJ39LyjbJkQFMhmC+6GD9LaHGvMCrrjSnyIQ8+ekGA8PSmMrEH7R:1nsHyjtk2MYC5GD9fvLjlIQxe5S6

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies security service

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Detects Floxif payload

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Suspicious Office macro

      Office document equipped with macros.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks