General

  • Target

    Downloads.rar

  • Size

    30.7MB

  • Sample

    210315-4tlv3wg3ax

  • MD5

    475b06abee2f66e15943ac519666a381

  • SHA1

    becd1f63736d32bc5c2f3cff31caeef95921f10b

  • SHA256

    40ba07f9761a6565642d7aae57f2f4622030e33fe80eb46a543446dcb8e3f1ca

  • SHA512

    5c6fe9e948a1951ff973d2136ede19ac0f6bb1b9d268953f01391c1aa9b903300022bed19896188ea52d78aa987c5821d711e50fab0528726b3f7e2e22e1535a

Malware Config

Targets

    • Target

      04443c70d34ded7f17d3a00b0f3f7309291dbcb7957a1c5664aab6c7886b17be

    • Size

      730KB

    • MD5

      07f1fa24a6fcb3708ab0689a2706ad8c

    • SHA1

      5da69784e467f242b4f0318fed2b3aed988c6466

    • SHA256

      04443c70d34ded7f17d3a00b0f3f7309291dbcb7957a1c5664aab6c7886b17be

    • SHA512

      59a67d2e495b948a45f32f67e3e2a85f0d8343942677e16d8f53162b42ba3a535dd72b713ca1ab59f871a7cbb614f13626741b782b2b2cc4c875bf3a82e83bfb

    Score
    9/10
    • Detected Stratum cryptominer command

      Looks to be attempting to contact Stratum mining pool.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Cryptocurrency Miner

      Makes network request to known mining pool URL.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      05535d72f3f98c73d9b660625e1b627b1bebbd15d7d4add4ecc492a2b0d67a06

    • Size

      1.5MB

    • MD5

      5c3986f4603187cbd1aeb622c8df8d10

    • SHA1

      4c70e2f27d47516386780f7e6a1aefe870790e5b

    • SHA256

      05535d72f3f98c73d9b660625e1b627b1bebbd15d7d4add4ecc492a2b0d67a06

    • SHA512

      e3eba052589d7147c44b289a4bd5e5258d1c108915a5dedf5c337cc1bbeba0f93e939edc8c60923269324dbe2795fd5414d408b7c05e62aec6dd0b7d2a22d902

    Score
    1/10
    • Target

      1bec139d54d147196c4e736d8dcf1f39d2bff390d59d5b240b4a97e03763cf72

    • Size

      1.8MB

    • MD5

      feb0e4a9e482c4a551de22193719b54c

    • SHA1

      768e728b04f59c87ee318d92a90b82cd4981631c

    • SHA256

      1bec139d54d147196c4e736d8dcf1f39d2bff390d59d5b240b4a97e03763cf72

    • SHA512

      06a0f41f0060fbafc658a5da2246451a649fad8e1f58839d9b1d9914f00a80b46952e06d6bd027dbd3c06b8d04235e74652cdc0a589b12a6797b6458a547d196

    Score
    8/10
    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      1f670ff8cca59a61aa0d58f297788916a6a9a318c1e7a3319367b6ffdc45c755

    • Size

      777KB

    • MD5

      bcc7caa6a013aad40f40c4ef7711c725

    • SHA1

      1917a4ca3e14d003b618d1ba6835177bd12591b4

    • SHA256

      1f670ff8cca59a61aa0d58f297788916a6a9a318c1e7a3319367b6ffdc45c755

    • SHA512

      8383c150e5adc100cc92005747497eae33be8d09610577583961c73ecabf2c924f40394a7b9e64cac14e392f99ead367922e718b519689cc2bdc463c419edf41

    Score
    1/10
    • Target

      2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea

    • Size

      657KB

    • MD5

      8009e4433aad21916a7761d374ee2be9

    • SHA1

      e0538c4bb3d0310f827799c98707b681d1f91b45

    • SHA256

      2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea

    • SHA512

      404f98fb57d0842aa43d5a113a395ff1d5d963ae60bce81d4dc22f3f0b382a7ba06703b0d7404a240e5edf5f1f75f8bc9b980a966bd29b9e432cd09cb1507071

    • Locky (Lukitus variant)

      Variant of the Locky ransomware seen in the wild since late 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Sets desktop wallpaper using registry

    • Target

      372b929ae9362bf357a3a8c5c968921f2c950094d928b2ed2cf94ea04bcfdbef

    • Size

      846KB

    • MD5

      85003057fbddd3468478adc04a1b50cd

    • SHA1

      acdd39a0d8068bfc4a16a0193c90eae85a5831fa

    • SHA256

      372b929ae9362bf357a3a8c5c968921f2c950094d928b2ed2cf94ea04bcfdbef

    • SHA512

      989f0738855e83b3ec9d97a7c9f93c0362285393cb1b7a266d6d1287bffad97c3a674c1738d1d0dc32c9751f68025da34f176a9bcc81c27b39fc1accdbbabb06

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Target

      38ee6bea62658ae4fa75914261a5848a8db5b332ddfb52daf01e958871559e15

    • Size

      1.6MB

    • MD5

      7feccbef4ed3a323ed763d24d022e4df

    • SHA1

      c6d62240ffd19c94a5f5080d7518b65555eb4fb2

    • SHA256

      38ee6bea62658ae4fa75914261a5848a8db5b332ddfb52daf01e958871559e15

    • SHA512

      ccb1b77974fb1be74fc71f3f6d036aafdf077d214efadd933f8e3f7e4e9e9f4e8915d9d4da31b95a65e15c29429a726aa3d3116fbb4f2b73c3fa95ddc78d22e2

    Score
    3/10
    • Target

      437d91ce52c0b54e125d28ea1bc6b5547183f04e40f9e487150be7862e61688f

    • Size

      3.5MB

    • MD5

      7ec07e27817c7dc87b3cf22533509581

    • SHA1

      b3cd8a2386897d53133b8a6193989f2a6324a71f

    • SHA256

      437d91ce52c0b54e125d28ea1bc6b5547183f04e40f9e487150be7862e61688f

    • SHA512

      aed38074b14d441566677af3cada2b695f2ffca9651e79f3df0ccad9daac8c69d03cca016a4bd36a9fc3e798debe4a39cb60d00ef566c02c25813c35d6ccf36f

    Score
    4/10
    • Target

      447058c1c6551c352895be7569e33c96384da3757303fc97004be45f56b4e9a8

    • Size

      618KB

    • MD5

      fa441d64d6ff82b1720ad98b1140f955

    • SHA1

      0afa7eb0fb26f69ca0146c68d2b7d84c2ad5078e

    • SHA256

      447058c1c6551c352895be7569e33c96384da3757303fc97004be45f56b4e9a8

    • SHA512

      606dd4e96f435665b29c8254ef143e0c303c0304e452f2bf1d3206ef0803ae920885e4c751c2a9a5f4a93103bc5b81c9fdebb9289fbd1d3e13a1dbc32e838e4e

    Score
    9/10
    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Target

      5061c0b08d522fdae45fc9285ac45fb96a4e80bd859867a0e988dfaeb2b33b03

    • Size

      1001KB

    • MD5

      36882198e11da2783e28b84eed923fca

    • SHA1

      7b438dcc035151bdec22ff1c879ec0461ebad8fd

    • SHA256

      5061c0b08d522fdae45fc9285ac45fb96a4e80bd859867a0e988dfaeb2b33b03

    • SHA512

      cae626bd2810c171e73256e4553d9558b40fa98afca46b31dbb6fd81ebe70eaf2c16ec23f17f2fb41553bea7b21b1868ea867904e4ed2b479ae2c985fbc4d8f2

    Score
    1/10
    • Target

      5ed4b682efcc4d63e5fc8a5f666f64e206e710dd408455d6061ddf3d8c95aed4

    • Size

      611KB

    • MD5

      646a7f19343274ba87dbddc903dd60d0

    • SHA1

      eb84789fda3ad3fa6e838c954e1ac0d1e9fd2848

    • SHA256

      5ed4b682efcc4d63e5fc8a5f666f64e206e710dd408455d6061ddf3d8c95aed4

    • SHA512

      3589d32cce5620232b2b6e7b6fc4f64fad7cf7b0ff95bd161913f8f59b45a086c9d93aa453dbc6f4d9b63b40b7a3e1101f09fe6ee5bcd997de1177a5d798c362

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Target

      6970600d21285371d6a4fd6175b65b672b9b9aaea36353e1544f0672944c9fb5

    • Size

      766KB

    • MD5

      25fa4e744078e82fd359f8755191bdf5

    • SHA1

      6ef18a8590fc8aa4874ec16a3682123624eafbd8

    • SHA256

      6970600d21285371d6a4fd6175b65b672b9b9aaea36353e1544f0672944c9fb5

    • SHA512

      bf26f615cbccd58758adef227730a2bf90b9e038cf0078d413f749c513664a8f171b33f05539bcff46cec5182ed7be69a1d4fc2166ea5542b60eb275fbc03484

    Score
    1/10
    • Target

      72f528f9a6bb7e6ccf45d9e25e77badb6e9fd8533c0fd8dac26a087347ff8592

    • Size

      818KB

    • MD5

      d8e9c7825c9f7c3828ff4a579a965a8a

    • SHA1

      8db1c5dcd2d583a6644f7e7d613837309b0092a5

    • SHA256

      72f528f9a6bb7e6ccf45d9e25e77badb6e9fd8533c0fd8dac26a087347ff8592

    • SHA512

      9379b64c348f3b070cdf0a962ccd22f8ff7111fd0bbc7f242feca32cada3cb5ce46b132be1675705983f96e75146051ed2a84d36fe13bc7ac10fe89105a103b3

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Target

      73dcee7abeca24a9170f800d069e80283b9ea1bd7cc6fbabdf55c613897f9699

    • Size

      3.6MB

    • MD5

      5bdc58d9791dd30ca23b19c1ef88affb

    • SHA1

      73379a7aea0b87ffa3305603ae76e02443e9378f

    • SHA256

      73dcee7abeca24a9170f800d069e80283b9ea1bd7cc6fbabdf55c613897f9699

    • SHA512

      53113b9aebd79a9f64029491ea8b4eda159388a2c68010bac12f2ad32f1aa417f12ad27c2a554bfee2737cbe1e7c8374b315d8e6bc69ec9929cee372ebcc286d

    Score
    1/10
    • Target

      7e118b534abb919903bc15b33f5fe2db15a54f7f39a7abc87c61e4617f35c0d2

    • Size

      1.2MB

    • MD5

      629616cf3527c449d804903309e7ce66

    • SHA1

      90374cb88ca94ed7cc0ec7a0eca33be01e40b6d0

    • SHA256

      7e118b534abb919903bc15b33f5fe2db15a54f7f39a7abc87c61e4617f35c0d2

    • SHA512

      da12c2757632698ea0ba35261c95a3c712b3f4a2d276b628fba703d2a2c4c2e2d2929c6dc178c1cd18142d6010e54ef9b7b8b8f009ed5b402007bc7cd431fa67

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Suspicious use of SetThreadContext

    • Target

      8034fffb03faec5aa94d3c16cdb98dfbcce06e8f8f7a278f7c30cff0398ea03c

    • Size

      2.8MB

    • MD5

      1b571c3e29d65ece64e292985cbb020c

    • SHA1

      09ef64cdef28ea000ed410615a779d6b17039a01

    • SHA256

      8034fffb03faec5aa94d3c16cdb98dfbcce06e8f8f7a278f7c30cff0398ea03c

    • SHA512

      9c6330aa486796104ee0d8e0e71130b8e1a91dd16e347218e6a72d8a6b5ee7b99b1099f1fb2c02310f75b2032ac43781902d1e2a831d59273556829c85d613f4

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks

static1

upx
Score
8/10

behavioral1

minerpersistenceupx
Score
9/10

behavioral2

minerpersistenceupx
Score
9/10

behavioral3

Score
1/10

behavioral4

Score
1/10

behavioral5

discovery
Score
8/10

behavioral6

discovery
Score
8/10

behavioral7

Score
1/10

behavioral8

Score
1/10

behavioral9

locky_lukitusransomware
Score
10/10

behavioral10

locky_lukitusransomware
Score
10/10

behavioral11

persistencespywarestealerupx
Score
9/10

behavioral12

persistencespywarestealerupx
Score
9/10

behavioral13

Score
3/10

behavioral14

Score
3/10

behavioral15

Score
1/10

behavioral16

Score
4/10

behavioral17

upx
Score
9/10

behavioral18

upx
Score
9/10

behavioral19

Score
1/10

behavioral20

Score
1/10

behavioral21

Score
8/10

behavioral22

Score
8/10

behavioral23

Score
1/10

behavioral24

Score
1/10

behavioral25

persistenceupx
Score
8/10

behavioral26

persistenceupx
Score
8/10

behavioral27

Score
1/10

behavioral28

Score
1/10

behavioral29

xmrigminerupx
Score
10/10

behavioral30

xmrigminerupx
Score
10/10

behavioral31

imminentevasionspywaretrojan
Score
10/10

behavioral32

imminentevasionspywaretrojan
Score
10/10

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.