General

  • Target

    2025-03-30_b459471d07c98f63c55b1497295d3ca5_black-basta_darkgate_luca-stealer

  • Size

    1.1MB

  • Sample

    250330-h4266avnv2

  • MD5

    b459471d07c98f63c55b1497295d3ca5

  • SHA1

    13b98dc548b09a7179a32502d0f3a6d3d953a2ec

  • SHA256

    4a91a0b0323c96af778ec4e9f178094ef451d56bd656a40532f15dd14cc584da

  • SHA512

    f5268f1920a08cc411c3909b62a3cab3712b1ca0f7115bc090f92e0e334b79d912a0120ac87a0e506158aedd38e809e6a5f164d8e3293e8a967e3d31e8ccbe2f

  • SSDEEP

    24576:9nsJ39LyjbJkQFMhmC+6GD94AlJx8EporU:9nsHyjtk2MYC5GDCMCEOrU

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-03-30_b459471d07c98f63c55b1497295d3ca5_black-basta_darkgate_luca-stealer

    • Size

      1.1MB

    • MD5

      b459471d07c98f63c55b1497295d3ca5

    • SHA1

      13b98dc548b09a7179a32502d0f3a6d3d953a2ec

    • SHA256

      4a91a0b0323c96af778ec4e9f178094ef451d56bd656a40532f15dd14cc584da

    • SHA512

      f5268f1920a08cc411c3909b62a3cab3712b1ca0f7115bc090f92e0e334b79d912a0120ac87a0e506158aedd38e809e6a5f164d8e3293e8a967e3d31e8ccbe2f

    • SSDEEP

      24576:9nsJ39LyjbJkQFMhmC+6GD94AlJx8EporU:9nsHyjtk2MYC5GDCMCEOrU

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks