Resubmissions

13-01-2022 13:19

220113-qkhx6sade2 4

12-09-2021 07:40

210912-jhysaacbd3 10

12-09-2021 07:40

210912-jhp55sfbbr 10

12-09-2021 07:39

210912-jhc6kscbd2 10

12-09-2021 07:39

210912-jg161sfbbp 10

12-09-2021 07:38

210912-jgmnmafbbn 10

General

  • Target

    Dot.Tk.123.ticket.keygen.by.CORE.bin.zip

  • Size

    6.1MB

  • Sample

    210912-jhc6kscbd2

  • MD5

    e0e12184991eab552692c03d6853e425

  • SHA1

    2d31a35b75a09cb706bcec021031d0988e3aee97

  • SHA256

    01ecd5534093150c638a818c19f30b7264b3e6e1020edb7a2b17a35f793c6bb1

  • SHA512

    7281e166557eda5505122254ebb50b98ce572d422899f7ecce9d9b95f6f4aa93aaed87ec5511e5a30249be12f47840601edd8f18da23bf9339611516dac47527

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

pony

C2

http://www.oldhorse.info

Targets

    • Target

      Dot.Tk.123.ticket.keygen.by.CORE.bin

    • Size

      6.2MB

    • MD5

      0cb3efeb5d9312e068c57e7e55affed7

    • SHA1

      aad1c65d257c7d2929ffb916114bc532feba0a16

    • SHA256

      a974231d8889e05fedfbe73b5cc58e414de6fd5031765c998a24ac326f35b0b2

    • SHA512

      236ce9aa9e71f279e7833c4f0afbad15a2de4aaf62e78a82f1132224951f25f0a184aacfe5c963a20481c20cdb12e1a56e6aaf662f4a07c756abe0c539488898

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks