General

  • Target

    EMPTERROR_dropperV2.exe

  • Size

    6.1MB

  • Sample

    250222-sj9evasken

  • MD5

    f5e8e61944dda89d469dd493af83ef46

  • SHA1

    b7f1f7ccd1d8ee39b232aa24f3653dca504679e9

  • SHA256

    f7cd91ffd91485b364ffc57340a29e12ad5a594d6b4fa1670a221aaf5df3c583

  • SHA512

    7546fcc2810639d8ed74c019e75278e6cb485840c27980e80b0a42d7c00bac283beb0cb7fa3040dc0d4c0ae4204b8e5dd1938b44d19b7d307cb94fe00e6a5712

  • SSDEEP

    98304:4nsmtk2alVEh+bGJDBsPDyV5pDOYBK+tC4/ve2jT4JrTi7aL9vr:GLN8+V5paY8iRvx8viW

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      EMPTERROR_dropperV2.exe

    • Size

      6.1MB

    • MD5

      f5e8e61944dda89d469dd493af83ef46

    • SHA1

      b7f1f7ccd1d8ee39b232aa24f3653dca504679e9

    • SHA256

      f7cd91ffd91485b364ffc57340a29e12ad5a594d6b4fa1670a221aaf5df3c583

    • SHA512

      7546fcc2810639d8ed74c019e75278e6cb485840c27980e80b0a42d7c00bac283beb0cb7fa3040dc0d4c0ae4204b8e5dd1938b44d19b7d307cb94fe00e6a5712

    • SSDEEP

      98304:4nsmtk2alVEh+bGJDBsPDyV5pDOYBK+tC4/ve2jT4JrTi7aL9vr:GLN8+V5paY8iRvx8viW

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks