General

  • Target

    18be39daf69b6139f2e8c7e96cac0a5f.exe

  • Size

    3.2MB

  • Sample

    210608-lt6d969tp6

  • MD5

    18be39daf69b6139f2e8c7e96cac0a5f

  • SHA1

    f80d3598c1df89bad1bd8692162da5de4c1acd1d

  • SHA256

    aa38af0f16d1e18d0e9e3ce186b7b4505fce90d26dcb925108c1923df691bd38

  • SHA512

    78b1cc667c9d02716077b9cc3b994f18163b0bd2d0bb6c6408a169840fa6aacfc581e57cf9db1dc1796f2df474cca37a02dfe9e7aa55d7e4d2ed552da7e3b937

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

raccoon

Botnet

28198d4512d0cf31c204eddceb4471d79950b588

Attributes
  • url4cnc

    https://tttttt.me/capibar

rc4.plain
rc4.plain

Extracted

Family

cryptbot

C2

olmjby22.top

mortyl02.top

Attributes
  • payload_url

    http://vamzxy03.top/download.php?file=lv.exe

Extracted

Family

vidar

Version

39.2

Botnet

706

C2

https://dimashub.tumblr.com

Attributes
  • profile_id

    706

Targets

    • Target

      18be39daf69b6139f2e8c7e96cac0a5f.exe

    • Size

      3.2MB

    • MD5

      18be39daf69b6139f2e8c7e96cac0a5f

    • SHA1

      f80d3598c1df89bad1bd8692162da5de4c1acd1d

    • SHA256

      aa38af0f16d1e18d0e9e3ce186b7b4505fce90d26dcb925108c1923df691bd38

    • SHA512

      78b1cc667c9d02716077b9cc3b994f18163b0bd2d0bb6c6408a169840fa6aacfc581e57cf9db1dc1796f2df474cca37a02dfe9e7aa55d7e4d2ed552da7e3b937

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot Payload

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba Payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks