Resubmissions

13-01-2022 13:19

220113-qkhx6sade2 4

12-09-2021 07:40

210912-jhysaacbd3 10

12-09-2021 07:40

210912-jhp55sfbbr 10

12-09-2021 07:39

210912-jhc6kscbd2 10

12-09-2021 07:39

210912-jg161sfbbp 10

12-09-2021 07:38

210912-jgmnmafbbn 10

General

  • Target

    Dot.Tk.123.ticket.keygen.by.CORE.bin.zip

  • Size

    6.1MB

  • Sample

    210912-jhysaacbd3

  • MD5

    e0e12184991eab552692c03d6853e425

  • SHA1

    2d31a35b75a09cb706bcec021031d0988e3aee97

  • SHA256

    01ecd5534093150c638a818c19f30b7264b3e6e1020edb7a2b17a35f793c6bb1

  • SHA512

    7281e166557eda5505122254ebb50b98ce572d422899f7ecce9d9b95f6f4aa93aaed87ec5511e5a30249be12f47840601edd8f18da23bf9339611516dac47527

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

http://fazanaharahe1.xyz/

http://xandelissane2.xyz/

http://ustiassosale3.xyz/

http://cytheriata4.xyz/

http://ggiergionard5.xyz/

http://rrelleynaniy6.store/

http://danniemusoa7.store/

http://nastanizab8.store/

http://onyokandis9.store/

http://dmunaavank10.store/

http://gilmandros11.site/

http://cusanthana12.site/

http://willietjeana13.site/

http://ximusokall14.site/

http://blodinetisha15.site/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Targets

    • Target

      Dot.Tk.123.ticket.keygen.by.CORE.bin

    • Size

      6.2MB

    • MD5

      0cb3efeb5d9312e068c57e7e55affed7

    • SHA1

      aad1c65d257c7d2929ffb916114bc532feba0a16

    • SHA256

      a974231d8889e05fedfbe73b5cc58e414de6fd5031765c998a24ac326f35b0b2

    • SHA512

      236ce9aa9e71f279e7833c4f0afbad15a2de4aaf62e78a82f1132224951f25f0a184aacfe5c963a20481c20cdb12e1a56e6aaf662f4a07c756abe0c539488898

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Djvu Ransomware

      Ransomware which is a variant of the STOP family.

    • ElysiumStealer

      ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

    • Modifies Windows Defender Real-time Protection settings

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks