Description
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
jks.exe
11MB
211022-rfwtxabga2
60f0cdd0610280950f2a77c612d27c73
25b97a2f1e6a38a77868cef03ae2ad2b810e9551
3a4fee55dbf0ecf16b8bdc2a8fcba340c842a3e9d3762aeac3e07317501d9ec6
1cff0e480c88f02fc0fec9ea1f827f2f57804da999973f707e8fd7e5e6a7cb892b139c527f09cf785fc248381ddc02b8d31e321defd83ea9c82472fc2d5ca3f6
Family | redline |
Botnet | sehrish2 |
C2 |
135.181.129.119:4805 |
Family | redline |
Botnet | ChrisNEW |
C2 |
194.104.136.5:46013 |
Family | redline |
Botnet | media21 |
C2 |
91.121.67.60:23325 |
Family | vidar |
Version | 41.5 |
Botnet | 937 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 937 |
Family | raccoon |
Botnet | 7c9b4504a63ed23664e38808e65948379b790395 |
Attributes |
url4cnc http://telegka.top/capibar http://telegin.top/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | icedid |
Campaign | 1875681804 |
jks.exe
60f0cdd0610280950f2a77c612d27c73
11MB
25b97a2f1e6a38a77868cef03ae2ad2b810e9551
3a4fee55dbf0ecf16b8bdc2a8fcba340c842a3e9d3762aeac3e07317501d9ec6
1cff0e480c88f02fc0fec9ea1f827f2f57804da999973f707e8fd7e5e6a7cb892b139c527f09cf785fc248381ddc02b8d31e321defd83ea9c82472fc2d5ca3f6
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
IcedID is a banking trojan capable of stealing credentials.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
Detects executables packed with ASPack v2.12-2.42
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Attempts to read the root path of hard drives other than the default C: drive.
Uses a legitimate IP lookup service to find the infected system's external IP.