Analysis
-
max time kernel
1524s -
max time network
1799s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-11-2020 17:21
Static task
static1
Behavioral task
behavioral1
Sample
Downloads.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Downloads.exe
Resource
win7v20201028
General
-
Target
Downloads.exe
-
Size
164.0MB
-
MD5
2e5f0d7f3b1505978fa81cf1e70d02d5
-
SHA1
99a6086d8a23ea12aba3a8ddd7f67c427981622f
-
SHA256
8701918235296129f184663d445f30d9235911a79a5aa8d0999c6467190bae51
-
SHA512
9239b684c9d2a0583a01c7f27d9fa76a271bc729645e3b222f02d6dffdec347cfef706c5a79aafb97f251bb2c92fde25583f004dd583640e8d9eb8d1b2e7441f
Malware Config
Extracted
Protocol: ftp- Host:
45.141.184.35 - Port:
21 - Username:
alex - Password:
easypassword
Extracted
revengerat
YT
yukselofficial.duckdns.org:5552
RV_MUTEX-WlgZblRvZwfRtNH
Extracted
revengerat
system
yj233.e1.luyouxia.net:20645
RV_MUTEX-GeVqDyMpzZJHO
Extracted
revengerat
samay
shnf-47787.portmap.io:47787
RV_MUTEX
Extracted
hawkeye_reborn
10.1.2.2
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
castor123@
245f77ec-c812-48df-870b-886d22992db6
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:castor123@ _EmailPort:587 _EmailSSL:true _EmailServer:smtp.yandex.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:245f77ec-c812-48df-870b-886d22992db6 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:10.1.2.2 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - RebornX, Version=10.1.2.2, Culture=neutral, PublicKeyToken=null
Extracted
cobaltstrike
http://47.91.237.42:8443/__utm.gif
-
access_type
512
-
beacon_type
2048
-
create_remote_thread
0
-
day
0
-
dns_idle
0
-
dns_sleep
0
-
host
47.91.237.42,/__utm.gif
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
- injection_process
-
jitter
0
-
maxdns
255
-
month
0
- pipe_name
-
polling_time
60000
-
port_number
8443
- proxy_password
- proxy_server
- proxy_username
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDS7zRQv7EhhTkbgDrCNBsNay7lzQFmcC/GWwjOq93nKwPSszjIKgtW8nwhtoRhr6MFZx4DSYFdeuJDrtJNcTZz2C/LgZzhSQJmhiEqCkVqPPCfK1C6S4PzDrzy9L794rPLOuoewlGAXgiH5/Ae2aC5k2wedRNfes3DJZDDCaJJYwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown3
0
-
unknown4
0
-
unknown5
2.018915346e+09
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0)
-
year
0
Extracted
revengerat
XDSDDD
84.91.119.105:333
RV_MUTEX-wtZlNApdygPh
Extracted
revengerat
Victime
cocohack.dtdns.net:84
RV_MUTEX-OKuSAtYBxGgZHx
Extracted
zloader
main
26.02.2020
https://airnaa.org/sound.php
https://banog.org/sound.php
https://rayonch.org/sound.php
Extracted
smokeloader
2019
http://advertserv25.world/logstatx77/
http://mailstatm74.club/logstatx77/
http://kxservx7zx.club/logstatx77/
http://dsmail977sx.xyz/logstatx77/
http://fdmail709.club/logstatx77/
http://servicestar751.club/logstatx77/
http://staradvert9075.club/logstatx77/
http://staradvert1883.club/logstatx77/
Extracted
revengerat
INSERT-COIN
3.tcp.ngrok.io:24041
RV_MUTEX
Extracted
zloader
07/04
https://xyajbocpggsr.site/wp-config.php
https://ooygvpxrb.pw/wp-config.php
Extracted
zloader
09/04
https://eoieowo.casa/wp-config.php
https://dcgljuzrb.pw/wp-config.php
Extracted
zloader
25/03
https://wgyvjbse.pw/milagrecf.php
https://botiq.xyz/milagrecf.php
Extracted
formbook
4.0
http://www.worstig.com/w9z/
crazzysex.com
hanferd.com
gteesrd.com
bayfrontbabyplace.com
jicuiquan.net
relationshiplink.net
ohchacyberphoto.com
kauegimenes.com
powerful-seldom.com
ketotoken.com
make-money-online-success.com
redgoldcollection.com
hannan-football.com
hamptondc.com
vllii.com
aa8520.com
platform35markethall.com
larozeimmo.com
oligopoly.net
llhak.info
fisioservice.com
tesla-magnumopus.com
cocodrilodigital.com
pinegrovesg.com
traveladventureswithme.com
hebitaixin.com
golphysi.com
gayjeans.com
quickhire.expert
randomviews1.com
eatatnobu.com
topmabati.com
mediaupside.com
spillerakademi.com
thebowtie.store
sensomaticloadcell.com
turismodemadrid.net
yuhe89.com
wernerkrug.com
cdpogo.net
dannynhois.com
realestatestructureddata.com
matewhereareyou.net
laimeibei.ltd
sw328.com
lmwworks.net
xtremefish.com
tonerias.com
dsooneclinicianexpert.com
281clara.com
smmcommunity.net
dreamneeds.info
twocraft.com
yasasiite.salon
advk8qi.top
drabist.com
europartnersplus.com
saltbgone.com
teslaoceanic.info
bestmedicationstore.com
buynewcartab.live
prospect.money
viebrocks.com
transportationhappy.com
Extracted
gozi_rm3
86920224
https://sibelikinciel.xyz
-
build
300869
-
exe_type
loader
-
server_id
12
-
url_path
index.htm
Extracted
emotet
Epoch3
71.57.180.213:80
185.86.148.68:443
168.235.82.183:8080
181.113.229.139:443
181.134.9.162:80
217.199.160.224:8080
105.209.235.113:8080
216.75.37.196:8080
97.104.107.190:80
203.153.216.182:7080
107.161.30.122:8080
41.106.96.12:80
202.5.47.71:80
201.235.10.215:80
105.213.67.88:80
115.79.195.246:80
179.5.118.12:80
212.112.113.235:80
139.59.12.63:8080
177.37.81.212:443
81.17.93.134:80
46.32.229.152:8080
66.61.94.36:80
172.96.190.154:8080
176.9.93.82:7080
5.79.70.250:8080
190.212.140.6:80
37.46.129.215:8080
115.165.3.213:80
201.213.177.139:80
187.64.128.197:80
92.24.51.238:80
185.208.226.142:8080
50.116.78.109:8080
46.105.131.68:8080
181.114.114.203:80
190.190.15.20:80
198.57.203.63:8080
188.251.213.180:443
185.142.236.163:443
182.176.95.147:80
143.95.101.72:8080
181.164.110.7:80
113.161.148.81:80
51.38.201.19:7080
31.146.61.34:80
75.139.38.211:80
157.7.164.178:8081
203.153.216.178:7080
212.156.133.218:80
81.214.253.80:443
87.106.231.60:8080
190.164.75.175:80
77.74.78.80:443
179.62.238.49:80
78.189.60.109:443
177.32.8.85:80
195.201.56.70:8080
190.53.144.120:80
75.127.14.170:8080
177.144.130.105:443
178.33.167.120:8080
192.210.217.94:8080
192.241.220.183:8080
188.0.135.237:80
74.208.173.91:8080
182.187.139.200:8080
172.105.78.244:8080
41.185.29.128:8080
197.83.232.19:80
87.252.100.28:80
115.78.11.155:80
192.163.221.191:8080
91.83.93.103:443
139.99.157.213:8080
Extracted
danabot
92.204.160.54
2.56.213.179
45.153.186.47
93.115.21.29
185.45.193.50
193.34.166.247
Extracted
smokeloader
2017
http://92.53.105.14/
Extracted
qakbot
spx129
1590734339
94.10.81.239:443
94.52.160.116:443
67.0.74.119:443
175.137.136.79:443
73.232.165.200:995
79.119.67.149:443
62.38.111.70:2222
108.58.9.238:993
216.110.249.252:2222
67.209.195.198:3389
84.247.55.190:443
96.37.137.42:443
94.176.220.76:2222
173.245.152.231:443
96.227.122.123:443
188.192.75.8:995
24.229.245.124:995
71.163.225.75:443
75.71.77.59:443
104.36.135.227:443
173.173.77.164:443
207.255.161.8:2222
68.39.177.147:995
178.193.33.121:2222
72.209.191.27:443
67.165.206.193:995
64.19.74.29:995
117.199.195.112:443
75.87.161.32:995
188.173.214.88:443
173.22.120.11:2222
96.41.93.96:443
86.125.210.26:443
24.10.42.174:443
47.201.1.210:443
69.92.54.95:995
24.202.42.48:2222
47.205.231.60:443
66.26.160.37:443
65.131.44.40:995
24.110.96.149:443
108.58.9.238:443
77.159.149.74:443
74.56.167.31:443
75.137.239.211:443
47.153.115.154:995
173.172.205.216:443
184.98.104.7:995
24.46.40.189:2222
98.115.138.61:443
35.142.12.163:2222
189.231.198.212:443
47.146.169.85:443
173.21.10.71:2222
24.42.14.241:443
188.27.6.170:443
89.137.77.237:443
5.13.99.38:995
93.113.90.128:443
72.179.242.236:0
73.210.114.187:443
80.240.26.178:443
85.186.141.62:995
81.103.144.77:443
98.4.227.199:443
24.122.228.88:443
150.143.128.70:2222
47.153.115.154:443
65.116.179.83:443
50.29.181.193:995
189.140.112.184:443
142.129.227.86:443
74.134.46.7:443
220.135.31.140:2222
172.78.87.180:443
24.201.79.208:2078
97.127.144.203:2222
100.4.173.223:443
59.124.10.133:443
89.43.108.19:443
216.163.4.91:443
67.83.54.76:2222
72.204.242.138:443
24.43.22.220:995
67.250.184.157:443
78.97.145.242:443
203.198.96.239:443
104.174.71.153:2222
24.28.183.107:995
197.160.20.211:443
79.117.161.67:21
82.76.239.193:443
69.246.151.5:443
78.96.192.26:443
216.201.162.158:995
108.21.107.203:443
107.2.148.99:443
189.236.218.181:443
75.110.250.89:443
211.24.72.253:443
207.255.161.8:443
162.154.223.73:443
50.104.186.71:443
100.38.123.22:443
96.18.240.158:443
108.183.200.239:443
173.187.170.190:443
100.40.48.96:443
71.80.66.107:443
67.197.97.144:443
69.28.222.54:443
47.136.224.60:443
47.202.98.230:443
184.180.157.203:2222
104.221.4.11:2222
70.173.46.139:443
213.67.45.195:2222
71.31.160.43:22
189.159.113.190:995
98.148.177.77:443
98.116.62.242:443
68.4.137.211:443
108.227.161.27:995
173.187.103.35:443
117.216.185.86:443
75.132.35.60:443
98.219.77.197:443
24.43.22.220:443
207.255.161.8:2087
72.190.101.70:443
189.160.217.221:443
207.255.161.8:32102
24.226.137.154:443
66.222.88.126:995
108.58.9.238:995
1.40.42.4:443
47.152.210.233:443
72.45.14.185:443
82.127.193.151:2222
101.108.113.6:443
98.13.0.128:443
175.111.128.234:995
175.111.128.234:443
216.137.140.236:2222
24.191.214.43:2083
72.177.157.217:443
72.29.181.77:2078
203.106.195.139:443
98.114.185.3:443
Extracted
formbook
4.1
http://www.joomlas123.com/i0qi/
http://www.norjax.com/app/
mytakeawaybox.com
goutaihuo.com
kuzey.site
uppertenpiercings.amsterdam
honeygrandpa.com
jenniferabramslaw.com
ncarian.com
heavilymeditatedhouston.com
gsbjyzx.com
akisanblog.com
taoyuanreed.com
jasperrvservices.com
yabbanet.com
myhealthfuldiet.com
flipdigitalcoins.com
toes.photos
shoottillyoumiss.com
maserental.com
smarteacher.net
hamdimagdeco.com
wuxifanggang.com
alamediationtraining.com
vfoe.team
kms-sp.com
gfidevfight.net
anomadbackpacker.com
21oms.us
australianseniorpreneur.com
valuereceipt.com
superbetbahis.com
rsrgoup.com
hoidonghuongkimson.com
parmedpharma.com
discoveryoverload.com
livetv247.win
jepekha.com
6o5ttvst.biz
netcorrespondents.com
cscycorp.com
emonkeygraphics.com
tillyaeva-lola.news
dgx9.com
jiucai5.com
justwoodsouthern.com
dentalexpertstraining.com
amazoncarpet.com
xsxnet.net
androidaso.com
jinhucai.com
wellnessitaly.store
clashrayalefreebies.com
wxvbill.com
quantun.network
allnaturalcbdshampton.com
mobo.technology
livinglifeawakened.com
canliarkadas.net
littlealohadaycare.com
wendyoei.com
kaz.site
puremind.info
queenscrossingneurosurgery.com
theworldexams.com
taptrips.com
Extracted
raccoon
5e4db353b88c002ba6466c06437973619aad03b3
-
url4cnc
https://telete.in/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
asyncrat
0.5.7B
agentttt.ac.ug:6970
agentpurple.ac.ug:6970
AsyncMutex_6SI8OkPnk
-
aes_key
16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
agentttt.ac.ug,agentpurple.ac.ug
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Extracted
zloader
CanadaLoads
Nerino
https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php
https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php
https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php
https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php
https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php
https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php
https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/14564-61233-0x0000000000400000-0x000000000040C000-memory.dmp disable_win_def behavioral1/memory/14564-61235-0x000000000040616E-mapping.dmp disable_win_def behavioral1/files/0x0005000000018c8c-63389.dat disable_win_def behavioral1/files/0x0005000000018c8c-63388.dat disable_win_def -
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
resource yara_rule behavioral1/memory/6628-278-0x0000000004F20000-0x0000000004F22000-memory.dmp coreentity -
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral1/files/0x000200000001acd7-2049.dat family_danabot -
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
resource yara_rule behavioral1/memory/9596-1660-0x00000000004A2B3E-mapping.dmp family_masslogger behavioral1/memory/9596-1654-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/files/0x000100000001aebf-17615.dat family_redline -
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000100000001adaf-26216.dat acprotect behavioral1/files/0x000100000001adae-26215.dat acprotect -
AgentTesla Payload 7 IoCs
resource yara_rule behavioral1/files/0x000100000001abc4-244.dat family_agenttesla behavioral1/files/0x000100000001abc4-243.dat family_agenttesla behavioral1/files/0x0002000000019d21-456.dat family_agenttesla behavioral1/files/0x0002000000019d21-463.dat family_agenttesla behavioral1/memory/2972-569-0x000000000044CCFE-mapping.dmp family_agenttesla behavioral1/memory/5784-761-0x000000000044CF8E-mapping.dmp family_agenttesla behavioral1/memory/8428-1836-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/14112-58751-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/14112-58752-0x000000000040C76E-mapping.dmp asyncrat -
resource yara_rule behavioral1/files/0x000100000001ab87-116.dat cryptone behavioral1/files/0x000100000001ab8c-114.dat cryptone behavioral1/files/0x000100000001abc2-220.dat cryptone behavioral1/files/0x000100000001abc2-218.dat cryptone behavioral1/files/0x000100000001abd8-652.dat cryptone behavioral1/files/0x000100000001abd8-756.dat cryptone behavioral1/files/0x000100000001abd8-1814.dat cryptone behavioral1/files/0x000100000001ad65-14079.dat cryptone behavioral1/files/0x000100000001ad65-14507.dat cryptone behavioral1/files/0x000100000001ad65-55319.dat cryptone behavioral1/files/0x000100000001ad65-70225.dat cryptone -
Emotet Payload 2 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral1/memory/7844-440-0x0000000002220000-0x000000000222C000-memory.dmp emotet behavioral1/memory/6740-378-0x0000000002050000-0x000000000205C000-memory.dmp emotet -
Formbook Payload 12 IoCs
resource yara_rule behavioral1/memory/6676-183-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/6676-184-0x000000000041E2D0-mapping.dmp formbook behavioral1/memory/7032-222-0x0000000000000000-mapping.dmp formbook behavioral1/memory/8636-1961-0x000000000041E2D0-mapping.dmp formbook behavioral1/memory/10108-2066-0x0000000000000000-mapping.dmp formbook behavioral1/memory/7032-16408-0x0000000005620000-0x000000000573E000-memory.dmp formbook behavioral1/memory/1136-19537-0x00000000034E0000-0x00000000035BC000-memory.dmp formbook behavioral1/memory/10696-66150-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/10696-66151-0x000000000041E270-mapping.dmp formbook behavioral1/memory/10696-66377-0x0000000001670000-0x0000000001785000-memory.dmp formbook behavioral1/memory/13384-66596-0x0000000000000000-mapping.dmp formbook behavioral1/memory/13384-66709-0x00000000055F0000-0x0000000005785000-memory.dmp formbook -
M00nD3v Logger Payload 3 IoCs
Detects M00nD3v Logger payload in memory.
resource yara_rule behavioral1/memory/1732-17-0x000000000048A1DE-mapping.dmp m00nd3v_logger behavioral1/memory/1732-16-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger behavioral1/memory/492-24-0x000000000048A1DE-mapping.dmp m00nd3v_logger -
ModiLoader First Stage 1 IoCs
resource yara_rule behavioral1/memory/14812-59107-0x00000000041C0000-0x000000000421C000-memory.dmp modiloader_stage1 -
Nirsoft 3 IoCs
resource yara_rule behavioral1/files/0x0003000000015431-2084.dat Nirsoft behavioral1/files/0x000100000001ad8d-63637.dat Nirsoft behavioral1/files/0x000100000001ad8d-63638.dat Nirsoft -
ReZer0 packer 4 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral1/memory/6628-279-0x0000000007D70000-0x0000000007DC3000-memory.dmp rezer0 behavioral1/memory/3368-767-0x0000000008C90000-0x0000000008CE1000-memory.dmp rezer0 behavioral1/memory/8688-2051-0x0000000002D20000-0x0000000002D29000-memory.dmp rezer0 behavioral1/memory/2168-4991-0x0000000008B20000-0x0000000008B73000-memory.dmp rezer0 -
RevengeRat Executable 13 IoCs
resource yara_rule behavioral1/files/0x000100000001abaf-4.dat revengerat behavioral1/files/0x000100000001abaf-5.dat revengerat behavioral1/files/0x000100000001aba5-7.dat revengerat behavioral1/files/0x000100000001aba5-8.dat revengerat behavioral1/files/0x000100000001abae-12.dat revengerat behavioral1/files/0x000100000001abae-13.dat revengerat behavioral1/files/0x000100000001abab-35.dat revengerat behavioral1/files/0x000100000001abab-36.dat revengerat behavioral1/files/0x000100000001abad-75.dat revengerat behavioral1/files/0x000100000001abac-92.dat revengerat behavioral1/files/0x000100000001abaf-425.dat revengerat behavioral1/files/0x000100000001abab-910.dat revengerat behavioral1/files/0x000100000001aba5-1744.dat revengerat -
resource yara_rule behavioral1/files/0x000100000001adac-24714.dat aspack_v212_v242 behavioral1/files/0x000100000001adac-25380.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 1784 hyundai steel-pipe- job 8010(1).exe 2692 file(1).exe 2836 file.exe 1268 hyundai steel-pipe- job 8010.exe 2524 KLwC6vii.exe 936 hyundai steel-pipe- job 8010(1).exe 1732 hyundai steel-pipe- job 8010(1).exe 740 cobaltstrike_shellcode.exe 3492 b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe 492 hyundai steel-pipe- job 8010.exe 3984 2019-09-02_22-41-10.exe 804 2019-09-02_22-41-10.exe 3828 905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe -
resource yara_rule behavioral1/files/0x000100000001ab83-74.dat upx behavioral1/files/0x000100000001aba2-96.dat upx behavioral1/files/0x000100000001aba2-364.dat upx behavioral1/files/0x000100000001ac91-2101.dat upx behavioral1/files/0x000100000001ad8d-4463.dat upx behavioral1/files/0x000200000001ae30-9292.dat upx behavioral1/files/0x000200000001ae30-9291.dat upx behavioral1/files/0x000200000001aeb5-16489.dat upx behavioral1/files/0x000100000001adaf-26216.dat upx behavioral1/files/0x000100000001adae-26215.dat upx behavioral1/files/0x000500000001af04-36129.dat upx behavioral1/files/0x000500000001af04-36128.dat upx behavioral1/files/0x000500000001af04-41164.dat upx behavioral1/files/0x000200000001af2a-63472.dat upx behavioral1/files/0x000200000001af2a-63471.dat upx behavioral1/files/0x000100000001ad8d-63530.dat upx behavioral1/files/0x000400000001af35-65618.dat upx behavioral1/files/0x000500000001af04-70130.dat upx behavioral1/files/0x000500000001af04-70129.dat upx -
resource yara_rule behavioral1/files/0x000100000001ae21-63491.dat vmprotect behavioral1/files/0x000100000001ae21-63490.dat vmprotect -
Loads dropped DLL 1 IoCs
pid Process 804 2019-09-02_22-41-10.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/6624-248-0x0000000004820000-0x000000000482F000-memory.dmp agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 bot.whatismyipaddress.com 80 ip-api.com 349 bot.whatismyipaddress.com 411 checkip.amazonaws.com 818 bot.whatismyipaddress.com 1265 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1784 set thread context of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1268 set thread context of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 3984 set thread context of 804 3984 2019-09-02_22-41-10.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
resource yara_rule behavioral1/files/0x000100000001ab78-122.dat nsis_installer_1 behavioral1/files/0x000100000001ab78-122.dat nsis_installer_2 behavioral1/files/0x000100000001ab75-97.dat nsis_installer_1 behavioral1/files/0x000100000001ab75-97.dat nsis_installer_2 behavioral1/files/0x000200000001aca0-1818.dat nsis_installer_1 behavioral1/files/0x000200000001aca0-1818.dat nsis_installer_2 behavioral1/files/0x000100000001ab75-10935.dat nsis_installer_1 behavioral1/files/0x000100000001ab75-10935.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2019-09-02_22-41-10.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2019-09-02_22-41-10.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2019-09-02_22-41-10.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 KLwC6vii.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString KLwC6vii.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Downloads.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Downloads.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1784 hyundai steel-pipe- job 8010(1).exe 1784 hyundai steel-pipe- job 8010(1).exe 1784 hyundai steel-pipe- job 8010(1).exe 1268 hyundai steel-pipe- job 8010.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2692 file(1).exe Token: SeDebugPrivilege 2836 file.exe Token: SeDebugPrivilege 1784 hyundai steel-pipe- job 8010(1).exe Token: SeDebugPrivilege 2524 KLwC6vii.exe Token: SeDebugPrivilege 1268 hyundai steel-pipe- job 8010.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1144 Downloads.exe 1144 Downloads.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1784 wrote to memory of 936 1784 hyundai steel-pipe- job 8010(1).exe 86 PID 1784 wrote to memory of 936 1784 hyundai steel-pipe- job 8010(1).exe 86 PID 1784 wrote to memory of 936 1784 hyundai steel-pipe- job 8010(1).exe 86 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1784 wrote to memory of 1732 1784 hyundai steel-pipe- job 8010(1).exe 87 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 1268 wrote to memory of 492 1268 hyundai steel-pipe- job 8010.exe 90 PID 3984 wrote to memory of 804 3984 2019-09-02_22-41-10.exe 93 PID 3984 wrote to memory of 804 3984 2019-09-02_22-41-10.exe 93 PID 3984 wrote to memory of 804 3984 2019-09-02_22-41-10.exe 93 PID 3984 wrote to memory of 804 3984 2019-09-02_22-41-10.exe 93 PID 3984 wrote to memory of 804 3984 2019-09-02_22-41-10.exe 93 PID 3984 wrote to memory of 804 3984 2019-09-02_22-41-10.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Downloads.exe"C:\Users\Admin\AppData\Local\Temp\Downloads.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1144
-
C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe"C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe"{path}"2⤵
- Executes dropped EXE
PID:936
-
-
C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe"{path}"2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\Desktop\file(1).exe"C:\Users\Admin\Desktop\file(1).exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010.exe"C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010.exe"{path}"2⤵
- Executes dropped EXE
PID:492
-
-
C:\Users\Admin\Desktop\KLwC6vii.exe"C:\Users\Admin\Desktop\KLwC6vii.exe"1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
C:\Users\Admin\Desktop\cobaltstrike_shellcode.exe"C:\Users\Admin\Desktop\cobaltstrike_shellcode.exe"1⤵
- Executes dropped EXE
PID:740
-
C:\Users\Admin\Desktop\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe"C:\Users\Admin\Desktop\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe"1⤵
- Executes dropped EXE
PID:3492
-
C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe"C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe"C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:804
-
-
C:\Users\Admin\Desktop\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"C:\Users\Admin\Desktop\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"1⤵
- Executes dropped EXE
PID:3828