General

  • Target

    Call.Accounting.Mate.Version.2.serial.key.gen.by.FUTURiTY.zip

  • Size

    7.0MB

  • Sample

    210419-m7dawr9kzx

  • MD5

    85a0d6258d3e73d5fb9deb32ca4ec3e6

  • SHA1

    584299f6373043c97d24fad7060ad18ddc83e472

  • SHA256

    083a6d8273b242e48c1a886bdb40a5f5825342bb85140b23329737c9677dd789

  • SHA512

    3051d7da4452f0457fd4253b3a571f4a9b85a988a010609af2e6d551d7159d692479f63a27b685956c7b3f9fa8e7f8352d68213ce5f0a35e42395e33b1a1290b

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Targets

    • Target

      Call.Accounting.Mate.Version.2.serial.key.gen.by.FUTURiTY.exe

    • Size

      7.1MB

    • MD5

      a784121f4d01508c351c93f507cdf3c4

    • SHA1

      2e2e9d04de77d210ca9f7c3126140d8a921ea786

    • SHA256

      c5c24b13dbbbac669200fe8db94c6984db33aee1676c8899d2c5d922c414d14f

    • SHA512

      36adee22a92a2f3545b132e7c0df3769c601d50a6780a71a2e0a715618f2e3d340aaf7becf9e9c984592c058a3d77d69e47290ad4ebc86637d9872762f83b7ae

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

4
T1005

Command and Control

Web Service

1
T1102

Tasks