General

  • Target

    a68a2cc4a8b2ad718667b119888e1ce6.exe

  • Size

    5.3MB

  • Sample

    210904-2w85aaeee5

  • MD5

    a68a2cc4a8b2ad718667b119888e1ce6

  • SHA1

    716bc67bc233a15b9e49d609df38f446e1c12edb

  • SHA256

    6287d0a9d9987e47175885ee55b3fdc4bbdd7fd67204b715ccff57803dd2e316

  • SHA512

    5610516de815ed667839738c1a9ba00a44c2fcc5eff9eaf64174edb253ffb0ad02ce464ed8831e65e1e396388614786961b9bd99ff19a87ada7f03b370b3e8d3

Malware Config

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

NORMAN3

C2

45.14.49.184:28743

Extracted

Family

vidar

Version

40.4

Botnet

937

C2

https://romkaxarit.tumblr.com/

Attributes
  • profile_id

    937

Extracted

Family

raccoon

Botnet

b8ef25fa9e346b7a31e4b6ff160623dd5fed2474

Attributes
  • url4cnc

    https://telete.in/iphbarberleo

rc4.plain
rc4.plain

Targets

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks