General
-
Target
EMPTERROR_dropperV2.exe
-
Size
6.1MB
-
Sample
250222-sf8n5s1met
-
MD5
f5e8e61944dda89d469dd493af83ef46
-
SHA1
b7f1f7ccd1d8ee39b232aa24f3653dca504679e9
-
SHA256
f7cd91ffd91485b364ffc57340a29e12ad5a594d6b4fa1670a221aaf5df3c583
-
SHA512
7546fcc2810639d8ed74c019e75278e6cb485840c27980e80b0a42d7c00bac283beb0cb7fa3040dc0d4c0ae4204b8e5dd1938b44d19b7d307cb94fe00e6a5712
-
SSDEEP
98304:4nsmtk2alVEh+bGJDBsPDyV5pDOYBK+tC4/ve2jT4JrTi7aL9vr:GLN8+V5paY8iRvx8viW
Behavioral task
behavioral1
Sample
EMPTERROR_dropperV2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
EMPTERROR_dropperV2.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
EMPTERROR_dropperV2.exe
-
Size
6.1MB
-
MD5
f5e8e61944dda89d469dd493af83ef46
-
SHA1
b7f1f7ccd1d8ee39b232aa24f3653dca504679e9
-
SHA256
f7cd91ffd91485b364ffc57340a29e12ad5a594d6b4fa1670a221aaf5df3c583
-
SHA512
7546fcc2810639d8ed74c019e75278e6cb485840c27980e80b0a42d7c00bac283beb0cb7fa3040dc0d4c0ae4204b8e5dd1938b44d19b7d307cb94fe00e6a5712
-
SSDEEP
98304:4nsmtk2alVEh+bGJDBsPDyV5pDOYBK+tC4/ve2jT4JrTi7aL9vr:GLN8+V5paY8iRvx8viW
-
Xred family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-