General

  • Target

    file3.exe

  • Size

    346KB

  • Sample

    210517-lnkankzltn

  • MD5

    b973737d41ec6dfe3a5d8c82b48e3069

  • SHA1

    264e83b93187e11bb07b3d5c049585af46ab9c3c

  • SHA256

    dab1943418275fa0a684702d291fa2fd693bebc19b99f7af9ad8dc3dd0a47cb5

  • SHA512

    280102c1436d4c9d5095dad2a898449946a910bcaf2dea16c38b77707a954c8e2657f550a76a5bbc54b799d7d06044beb3d77b8a6a8f9353e205202653db3596

Malware Config

Extracted

Family

raccoon

Botnet

c46f13f8aadc028907d65c627fd9163161661f6c

Attributes
  • url4cnc

    https://telete.in/capibar

rc4.plain
rc4.plain

Extracted

Family

cryptbot

C2

sogwgy12.top

morkcx01.top

Attributes
  • payload_url

    http://dousaj01.top/download.php?file=lv.exe

Extracted

Family

danabot

Version

1827

Botnet

3

C2

184.95.51.183:443

184.95.51.175:443

192.210.198.12:443

184.95.51.180:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      file3.exe

    • Size

      346KB

    • MD5

      b973737d41ec6dfe3a5d8c82b48e3069

    • SHA1

      264e83b93187e11bb07b3d5c049585af46ab9c3c

    • SHA256

      dab1943418275fa0a684702d291fa2fd693bebc19b99f7af9ad8dc3dd0a47cb5

    • SHA512

      280102c1436d4c9d5095dad2a898449946a910bcaf2dea16c38b77707a954c8e2657f550a76a5bbc54b799d7d06044beb3d77b8a6a8f9353e205202653db3596

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot Payload

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks