General

  • Target

    eb4c908bf4649374644662ac2e50f7e9.exe

  • Size

    318KB

  • Sample

    210607-pxw968qrmx

  • MD5

    eb4c908bf4649374644662ac2e50f7e9

  • SHA1

    cdec9c7bad714149e6a5b10a9f5931fea457ac32

  • SHA256

    1eb4b2a30f7d2822fc91b6ead0a0524d381a17cf0cba9603fa3779aff8894e6d

  • SHA512

    009392c0725b3dc3f1a6914aba9c653038e7187a97a2181055744ea69b9bf3069a759d6f55facd114581c683705a39948feea13181170e76e4918d24cfe8179f

Malware Config

Extracted

Family

raccoon

Botnet

28198d4512d0cf31c204eddceb4471d79950b588

Attributes
  • url4cnc

    https://tttttt.me/capibar

rc4.plain
rc4.plain

Extracted

Family

cryptbot

C2

olmrso12.top

morleg01.top

Attributes
  • payload_url

    http://vamgha01.top/download.php?file=lv.exe

Extracted

Family

redline

Botnet

MIX 07.06

C2

185.215.113.17:18597

Targets

    • Target

      eb4c908bf4649374644662ac2e50f7e9.exe

    • Size

      318KB

    • MD5

      eb4c908bf4649374644662ac2e50f7e9

    • SHA1

      cdec9c7bad714149e6a5b10a9f5931fea457ac32

    • SHA256

      1eb4b2a30f7d2822fc91b6ead0a0524d381a17cf0cba9603fa3779aff8894e6d

    • SHA512

      009392c0725b3dc3f1a6914aba9c653038e7187a97a2181055744ea69b9bf3069a759d6f55facd114581c683705a39948feea13181170e76e4918d24cfe8179f

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot Payload

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks