General

  • Target

    ATRTool_2.0.exe

  • Size

    2.1MB

  • Sample

    250217-znsq8atr12

  • MD5

    3ae9004eaa14b935532ca38e56c364e0

  • SHA1

    022afbf6dc5577509e031f30fe570169710f056b

  • SHA256

    595eb49460b7eb4f393af28a335dcaf98317faad04a92e49e9eceaa1f7379f40

  • SHA512

    694c8403c53f40eeec2efef61f98cdbd76c1c187d3abcff550cd67aa8f96f375b81260a655d842be2cc9bc519281d97cafa790ea3524aa5ad48d3c298609aba8

  • SSDEEP

    49152:dnsHyjtk2MYC5GDgHyjtk2MYC5GD/qnUiBqnUUpQln:dnsmtk2aVmtk2aApOn

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      ATRTool_2.0.exe

    • Size

      2.1MB

    • MD5

      3ae9004eaa14b935532ca38e56c364e0

    • SHA1

      022afbf6dc5577509e031f30fe570169710f056b

    • SHA256

      595eb49460b7eb4f393af28a335dcaf98317faad04a92e49e9eceaa1f7379f40

    • SHA512

      694c8403c53f40eeec2efef61f98cdbd76c1c187d3abcff550cd67aa8f96f375b81260a655d842be2cc9bc519281d97cafa790ea3524aa5ad48d3c298609aba8

    • SSDEEP

      49152:dnsHyjtk2MYC5GDgHyjtk2MYC5GD/qnUiBqnUUpQln:dnsmtk2aVmtk2aApOn

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks