General

  • Target

    14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849

  • Size

    268KB

  • Sample

    210920-wxdrwahegp

  • MD5

    dd90c8773b2fc0ff28225258fd7b7ead

  • SHA1

    d29d57aa279a2dcd026b5d0d79f0def265f08b89

  • SHA256

    14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849

  • SHA512

    536e969d59cfc8b5e5d6a6e103d18f4aebd9dd5152c6e09e832622a10f12443ce1b4cf378bfb75cf22cf9cd692a6f0a65927199b0bacb72adc4c85ac7fcd1ba1

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://venerynnet1.top/

http://kevonahira2.top/

http://vegangelist3.top/

http://kingriffaele4.top/

http://arakeishant5.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

installbv

C2

80.85.137.89:17954

Extracted

Family

redline

Botnet

Moneymaker

C2

185.244.217.166:56316

Targets

    • Target

      14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849

    • Size

      268KB

    • MD5

      dd90c8773b2fc0ff28225258fd7b7ead

    • SHA1

      d29d57aa279a2dcd026b5d0d79f0def265f08b89

    • SHA256

      14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849

    • SHA512

      536e969d59cfc8b5e5d6a6e103d18f4aebd9dd5152c6e09e832622a10f12443ce1b4cf378bfb75cf22cf9cd692a6f0a65927199b0bacb72adc4c85ac7fcd1ba1

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks