General

  • Target

    6147627397840896.zip

  • Size

    2.9MB

  • Sample

    210811-m2gten8816

  • MD5

    640170d7f6e4e263522412d715882ebe

  • SHA1

    8602b54d144a2c6d45145b3b4499da96b56abbe5

  • SHA256

    7ad3394946993cd87a845bf6c4773eb1e05b1565fd240d686a58566e0be094ed

  • SHA512

    757f8315474c89e4d8561328ff23325f11889025c584dd4628ee97ff818d94c93ca00d7c570eb6e88e4373a98dd0f9bda8100eb297a2e6e72dd39b9f46c7d058

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

933

C2

https://sergeevih43.tumblr.com/

Attributes
  • profile_id

    933

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

Ani

C2

detuyaluro.xyz:80

Extracted

Family

vidar

Version

40

Botnet

916

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    916

Targets

    • Target

      aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536

    • Size

      2.9MB

    • MD5

      99ef63ade7acea38cd4053c5b69d61e0

    • SHA1

      a201c10fcdfb902ae87a7817179ecb84a6b50a90

    • SHA256

      aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536

    • SHA512

      01dd32dbc173fe549f2c087fe0e98394afe3e044bc10e96efb431ad6d43d37a0155e62b0516b689c0fdbf00d9fed09d792b4d9b8f01ab6a41ea118d3d9b01c6c

    • Modifies Windows Defender Real-time Protection settings

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks