General

  • Target

    adobe_illustrator_keygen_by_KeygenNinja.exe.7z

  • Size

    8.2MB

  • Sample

    210309-7h5mkw86lx

  • MD5

    c62d25c2c8ca5bee52810843d42520b4

  • SHA1

    b6a9ac1ba5e703fc88b3b8f2af33b83394238e99

  • SHA256

    a62c0a15222db8f589371a74a62b68bb98b5d00c30298539b25d132f28e2bae2

  • SHA512

    588f9adf1fa911266e0bde8dd3d3469a807289696c7a90e9115afeb4317c04a7a6d8467fec99dbbcd4496fadf27a581646abf993b4542b3cdf95c351b80ec0b1

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

raccoon

Botnet

51c194bfb6e404af0e5ff0b93b443907a6a845b1

Attributes
  • url4cnc

    https://telete.in/h_focus_1

rc4.plain
rc4.plain

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      adobe_illustrator_keygen_by_KeygenNinja.exe

    • Size

      8.2MB

    • MD5

      9d138fc7214e3406cfc203e4922ab3ac

    • SHA1

      3ec42683d6cd31870a54991386d2ca596f9cdeff

    • SHA256

      ec624715737071e22af8152d2170cb7a04217b3815a00302ff6f534994a7a97b

    • SHA512

      06414e7259ef270ebb668fcb628ee25e3cb265b64b5baba8fc842c45b8e31cb88cea4934b420cb27e7849ee87e62172b44416fff46ab43b5cd4be24dd6048f8b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies boot configuration data using bcdedit

    • Nirsoft

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks