General
-
Target
keygen-step-4.exe
-
Size
7.0MB
-
Sample
210228-3s1qjsqn1x
-
MD5
9b1372abe17a439bfcca639334246f98
-
SHA1
2bb99dca239e3e74f0c5d73d8092437a77c384d5
-
SHA256
b038b6a3e4cbb588a099ff589e135965b7641b004727ba268865c0e310ca4d05
-
SHA512
e5ec133fdca82e40525daf8a69c3be1dc5b0cda772902a52a5ff74b0e462543f0c2d41d30ad9c5ed737a6b8d6c7fc4f4d2487995262e09946c1945b9fa70251b
Static task
static1
Behavioral task
behavioral1
Sample
keygen-step-4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
keygen-step-4.exe
Resource
win10v20201028
Malware Config
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
Extracted
raccoon
5d27abda281eabc425bfae4c755a0a6f987d743b
-
url4cnc
https://telete.in/h_gagger_1
Targets
-
-
Target
keygen-step-4.exe
-
Size
7.0MB
-
MD5
9b1372abe17a439bfcca639334246f98
-
SHA1
2bb99dca239e3e74f0c5d73d8092437a77c384d5
-
SHA256
b038b6a3e4cbb588a099ff589e135965b7641b004727ba268865c0e310ca4d05
-
SHA512
e5ec133fdca82e40525daf8a69c3be1dc5b0cda772902a52a5ff74b0e462543f0c2d41d30ad9c5ed737a6b8d6c7fc4f4d2487995262e09946c1945b9fa70251b
-
Glupteba Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-