General

  • Target

    2025-05-20_bade1746e087fd85f361c57df7f557b2_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer

  • Size

    3.7MB

  • Sample

    250520-jrm25swnz7

  • MD5

    bade1746e087fd85f361c57df7f557b2

  • SHA1

    343abd4adbb4ee487dc84e748b8007f93e1db8eb

  • SHA256

    fda0dbb8e969280c923b31ff4a1e1d91e819080f6febf564aee5632b02911797

  • SHA512

    082a544e96dd3de5ef8b38adc8dcd38b20782f3bb585fb9d666ce154186560eaacbc732966b047e93ad49708ab5e2194a6073c69ec6c74f6d44a3f7e7095ba53

  • SSDEEP

    98304:Lnsmtk2a+1IaYcsJZnwks4UHE4TImORnAdIpLdQ2cRLhML:zLpGNZJkKSdI1dQ2ci

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Targets

    • Target

      2025-05-20_bade1746e087fd85f361c57df7f557b2_amadey_black-basta_darkgate_elex_gcleaner_luca-stealer

    • Size

      3.7MB

    • MD5

      bade1746e087fd85f361c57df7f557b2

    • SHA1

      343abd4adbb4ee487dc84e748b8007f93e1db8eb

    • SHA256

      fda0dbb8e969280c923b31ff4a1e1d91e819080f6febf564aee5632b02911797

    • SHA512

      082a544e96dd3de5ef8b38adc8dcd38b20782f3bb585fb9d666ce154186560eaacbc732966b047e93ad49708ab5e2194a6073c69ec6c74f6d44a3f7e7095ba53

    • SSDEEP

      98304:Lnsmtk2a+1IaYcsJZnwks4UHE4TImORnAdIpLdQ2cRLhML:zLpGNZJkKSdI1dQ2ci

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks