General

  • Target

    2025-04-08_bd76ac9affe768acf9f7ce2e744623d4_black-basta_darkgate_luca-stealer_poet-rat

  • Size

    18.0MB

  • Sample

    250408-q5wd1avwc1

  • MD5

    bd76ac9affe768acf9f7ce2e744623d4

  • SHA1

    d2e977ffef9320e4c776171062789678c75d8145

  • SHA256

    bb55d0930aa69981d026200b8ebac0378fef7571e41aa146221989bfa6e213ae

  • SHA512

    b1a030416440b47b6eb3c8dc7ae7683485e97c11a5b033aaead403475af69eb2dfda43b506618d2366086f60ed018f295ced9b3142e607c4d9fbae5ad33d09a3

  • SSDEEP

    98304:pnsmtk2abnTXdO7e2b+azcSekU1ZwEhBERTPBk+A5DkpsSjHV58lxHlo5Pgy6H0U:1LcdsbQbkU1ruD/klL6+BoUL

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-04-08_bd76ac9affe768acf9f7ce2e744623d4_black-basta_darkgate_luca-stealer_poet-rat

    • Size

      18.0MB

    • MD5

      bd76ac9affe768acf9f7ce2e744623d4

    • SHA1

      d2e977ffef9320e4c776171062789678c75d8145

    • SHA256

      bb55d0930aa69981d026200b8ebac0378fef7571e41aa146221989bfa6e213ae

    • SHA512

      b1a030416440b47b6eb3c8dc7ae7683485e97c11a5b033aaead403475af69eb2dfda43b506618d2366086f60ed018f295ced9b3142e607c4d9fbae5ad33d09a3

    • SSDEEP

      98304:pnsmtk2abnTXdO7e2b+azcSekU1ZwEhBERTPBk+A5DkpsSjHV58lxHlo5Pgy6H0U:1LcdsbQbkU1ruD/klL6+BoUL

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks