General

  • Target

    2025-03-30_38531f553d3fbb005986a8dc1918a3d7_amadey_cobalt-strike_smoke-loader

  • Size

    4.8MB

  • Sample

    250330-xj23zsxjv3

  • MD5

    38531f553d3fbb005986a8dc1918a3d7

  • SHA1

    5094614a0de1fa6715f768eaa62aaaf71f5edddd

  • SHA256

    d6f91424d9ddcd934eca5d2e3fb65dba42b4c2ec3ce1a9f5e90f19e0b0b70dc6

  • SHA512

    c283afc7903eebc32daf2b297d9356c25c611c8355169a4ecc14e8a3ba2158917363f43a221836e704da42b256f90d70a854aebd14b402ce5004ef00cfe1d567

  • SSDEEP

    98304:Knsmtk2a9pCd614yoqkcpDcL6o2mpQ5ZuzM/Vy1adhZ0HMvP2JQgD8PFyJgRqTS9:ELCBVovcdcL9tpQezKVJdhZIS+JQgDm9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.206.130:6666

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    xredline1@gmail.com

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-03-30_38531f553d3fbb005986a8dc1918a3d7_amadey_cobalt-strike_smoke-loader

    • Size

      4.8MB

    • MD5

      38531f553d3fbb005986a8dc1918a3d7

    • SHA1

      5094614a0de1fa6715f768eaa62aaaf71f5edddd

    • SHA256

      d6f91424d9ddcd934eca5d2e3fb65dba42b4c2ec3ce1a9f5e90f19e0b0b70dc6

    • SHA512

      c283afc7903eebc32daf2b297d9356c25c611c8355169a4ecc14e8a3ba2158917363f43a221836e704da42b256f90d70a854aebd14b402ce5004ef00cfe1d567

    • SSDEEP

      98304:Knsmtk2a9pCd614yoqkcpDcL6o2mpQ5ZuzM/Vy1adhZ0HMvP2JQgD8PFyJgRqTS9:ELCBVovcdcL9tpQezKVJdhZIS+JQgDm9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.