General

  • Target

    Setup.bin.zip

  • Size

    193KB

  • Sample

    210926-3vrpaafdf7

  • MD5

    0b5470c62a7450f4630c3c9db2647d8f

  • SHA1

    a96bd71b9bbee901c8a0da796af359ff6a3651fe

  • SHA256

    422eb7c3dc87faab3946dbdb16f243b6442ee94b2cdd9457a3ae76ed3ff64465

  • SHA512

    45ad0a7461e9719f976c2f0958bb58445aa0f4f82c9328fb677c7d3ff2dd7592c3f7f8453f1c1333e88d981494ec0f2c535b4569b1ad2110198a36b103980b1f

Malware Config

Extracted

Family

redline

Botnet

installs

C2

95.217.248.44:1052

Extracted

Family

raccoon

Botnet

a6fcc93b292a8646da63b0ca6ab4c489ee6ce058

Attributes
  • url4cnc

    https://t.me/amanwitharm

rc4.plain
rc4.plain

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Targets

    • Target

      Setup.bin

    • Size

      425KB

    • MD5

      8cfbcaa1997655b3d952957f9311642e

    • SHA1

      ef0e4cf3845c23a19415095870a0fb3eff6c5f39

    • SHA256

      e449366d90df613d6d968f16d0d7d8f471e38d66bbf669656380adbce1d5f8d9

    • SHA512

      b420d163d661b106eaee254aacab16210c0a7fd53122111f3db0abe9371137c5fc60d1076a26b8eb9bac33c2d9e591c978130cd7177e613e7592c9064a4c37e2

    • Arkei

      Arkei is an infostealer written in C++.

    • Modifies Windows Defender Real-time Protection settings

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Arkei Stealer Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks