General

  • Target

    2025-05-17_f1af156486d8c901855992c977b57392_amadey_black-basta_coinminer_darkgate_elex_gcleaner_luca-stealer_smoke-loader

  • Size

    9.4MB

  • Sample

    250517-jjwpbayq16

  • MD5

    f1af156486d8c901855992c977b57392

  • SHA1

    24e45293b92be96d1c9ed8985f5fb43f93c5ecde

  • SHA256

    a766c975e8c3e6991632d706a47db39792c5493d5e5ccf64d85ec909713de717

  • SHA512

    54c1bff73362dcb76f270fcc3872b2e0eaf63e6363cab54686a01d2e8a842c2e7a789ff43e4f8064b30173e23600963e9cd5cf9970454f1ea6e1ab5aebc60533

  • SSDEEP

    196608:yLjtbTi2sWmYRGzpt2Mj5w3jIiZLdoEVkJjKNzV:yHtbTQWmVzpl1T2oEVkJaV

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-05-17_f1af156486d8c901855992c977b57392_amadey_black-basta_coinminer_darkgate_elex_gcleaner_luca-stealer_smoke-loader

    • Size

      9.4MB

    • MD5

      f1af156486d8c901855992c977b57392

    • SHA1

      24e45293b92be96d1c9ed8985f5fb43f93c5ecde

    • SHA256

      a766c975e8c3e6991632d706a47db39792c5493d5e5ccf64d85ec909713de717

    • SHA512

      54c1bff73362dcb76f270fcc3872b2e0eaf63e6363cab54686a01d2e8a842c2e7a789ff43e4f8064b30173e23600963e9cd5cf9970454f1ea6e1ab5aebc60533

    • SSDEEP

      196608:yLjtbTi2sWmYRGzpt2Mj5w3jIiZLdoEVkJjKNzV:yHtbTQWmVzpl1T2oEVkJaV

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks