General

  • Target

    FB06EC887642C3C5C23FB43D9F81C93A.exe

  • Size

    268KB

  • Sample

    210507-q6kp1z7pja

  • MD5

    fb06ec887642c3c5c23fb43d9f81c93a

  • SHA1

    9fe8ef2fab3c34bd98fade711b8256e0511a1097

  • SHA256

    d00184f7ae894b5bfd832771e9a920f9c399ba785e9a2f89382d499ec32e54a2

  • SHA512

    7443dd4992cdfdfec37dac2deca8bc85539bede8e1de792b64b8a88d6c4d6c81301ce43dfc28bb8839d03881a9a948a7f5da616540db97442685a2ed391cc4dd

Malware Config

Extracted

Family

fickerstealer

C2

truzen.site:80

Extracted

Family

cryptbot

C2

eosbej52.top

morwxi05.top

Extracted

Family

redline

Botnet

MIX 07.05

C2

xisolenoy.xyz:80

Targets

    • Target

      FB06EC887642C3C5C23FB43D9F81C93A.exe

    • Size

      268KB

    • MD5

      fb06ec887642c3c5c23fb43d9f81c93a

    • SHA1

      9fe8ef2fab3c34bd98fade711b8256e0511a1097

    • SHA256

      d00184f7ae894b5bfd832771e9a920f9c399ba785e9a2f89382d499ec32e54a2

    • SHA512

      7443dd4992cdfdfec37dac2deca8bc85539bede8e1de792b64b8a88d6c4d6c81301ce43dfc28bb8839d03881a9a948a7f5da616540db97442685a2ed391cc4dd

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Command and Control

Web Service

1
T1102

Tasks