General

  • Target

    2025-05-20_571d30a27c09a504e257ca55d8ddbc50_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer

  • Size

    7.9MB

  • Sample

    250520-hd9tbacp5s

  • MD5

    571d30a27c09a504e257ca55d8ddbc50

  • SHA1

    0f8f5d0014622b310fb5a356424b12cb61e33f42

  • SHA256

    0f60508957079760ccb546035c0508e5b1ed7c2959a4f6d762acda76d45e0b32

  • SHA512

    df7a9376e1467e181bbd56526a3e663d9b4f4609f6c5cf4136cfcde8a1560ab1a2e0284e620af28077b2d8d1471d190c850b2f03af8535f422b3bdf59c333615

  • SSDEEP

    196608:6L049GfxidA1cQ379CfAaxRwhgiFcStLoKntczl6aI6HMaJTtGbyAgs:644QpidA1KfZRwhgRKntcza

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-05-20_571d30a27c09a504e257ca55d8ddbc50_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer

    • Size

      7.9MB

    • MD5

      571d30a27c09a504e257ca55d8ddbc50

    • SHA1

      0f8f5d0014622b310fb5a356424b12cb61e33f42

    • SHA256

      0f60508957079760ccb546035c0508e5b1ed7c2959a4f6d762acda76d45e0b32

    • SHA512

      df7a9376e1467e181bbd56526a3e663d9b4f4609f6c5cf4136cfcde8a1560ab1a2e0284e620af28077b2d8d1471d190c850b2f03af8535f422b3bdf59c333615

    • SSDEEP

      196608:6L049GfxidA1cQ379CfAaxRwhgiFcStLoKntczl6aI6HMaJTtGbyAgs:644QpidA1KfZRwhgRKntcza

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks