jks.exe

General
Target

jks.exe

Size

11MB

Sample

211022-rfwtxabga2

Score
10 /10
MD5

60f0cdd0610280950f2a77c612d27c73

SHA1

25b97a2f1e6a38a77868cef03ae2ad2b810e9551

SHA256

3a4fee55dbf0ecf16b8bdc2a8fcba340c842a3e9d3762aeac3e07317501d9ec6

SHA512

1cff0e480c88f02fc0fec9ea1f827f2f57804da999973f707e8fd7e5e6a7cb892b139c527f09cf785fc248381ddc02b8d31e321defd83ea9c82472fc2d5ca3f6

Malware Config

Extracted

Family redline
Botnet sehrish2
C2

135.181.129.119:4805

Extracted

Family redline
Botnet ChrisNEW
C2

194.104.136.5:46013

Extracted

Family redline
Botnet media21
C2

91.121.67.60:23325

Extracted

Family vidar
Version 41.5
Botnet 937
C2

https://mas.to/@xeroxxx

Attributes
profile_id
937

Extracted

Family raccoon
Botnet 7c9b4504a63ed23664e38808e65948379b790395
Attributes
url4cnc
http://telegka.top/capibar
http://telegin.top/capibar
https://t.me/capibar
rc4.plain
rc4.plain

Extracted

Family icedid
Campaign 1875681804
Targets
Target

jks.exe

MD5

60f0cdd0610280950f2a77c612d27c73

Filesize

11MB

Score
10/10
SHA1

25b97a2f1e6a38a77868cef03ae2ad2b810e9551

SHA256

3a4fee55dbf0ecf16b8bdc2a8fcba340c842a3e9d3762aeac3e07317501d9ec6

SHA512

1cff0e480c88f02fc0fec9ea1f827f2f57804da999973f707e8fd7e5e6a7cb892b139c527f09cf785fc248381ddc02b8d31e321defd83ea9c82472fc2d5ca3f6

Tags

Signatures

  • Azorult

    Description

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    Tags

  • IcedID, BokBot

    Description

    IcedID is a banking trojan capable of stealing credentials.

    Tags

  • Modifies Windows Defender Real-time Protection settings

    Tags

    TTPs

    Modify RegistryModify Existing ServiceDisabling Security Tools
  • Process spawned unexpected child process

    Description

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Description

    Simple but powerful infostealer which was very active in 2019.

    Tags

  • RedLine

    Description

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    Tags

  • RedLine Payload

  • Socelars

    Description

    Socelars is an infostealer targeting browser cookies and credit card credentials.

    Tags

  • Socelars Payload

  • Suspicious use of NtCreateProcessExOtherParentProcess

  • Vidar

    Description

    Vidar is an infostealer based on Arkei stealer.

    Tags

  • xmrig

    Description

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

    Tags

  • Checks for common network interception software

    Description

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    Tags

    TTPs

  • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    Tags

    TTPs

    Query RegistryVirtualization/Sandbox Evasion
  • Vidar Stealer

    Tags

  • ASPack v2.12-2.42

    Description

    Detects executables packed with ASPack v2.12-2.42

    Tags

  • Blocklisted process makes network request

  • Downloads MZ/PE file

  • Drops file in Drivers directory

  • Executes dropped EXE

  • Modifies Windows Firewall

    Tags

    TTPs

    Modify Existing Service
  • Checks BIOS information in registry

    Description

    BIOS information is often read in order to detect sandboxing environments.

    TTPs

    Query RegistrySystem Information Discovery
  • Checks computer location settings

    Description

    Looks up country code configured in the registry, likely geofence.

    TTPs

    Query RegistrySystem Information Discovery
  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses 2FA software files, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Checks for any installed AV software in registry

    TTPs

    Security Software Discovery
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery
  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery
  • Legitimate hosting services abused for malware hosting/C2

    TTPs

    Web Service
  • Looks up external IP address via web service

    Description

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory

  • Suspicious use of NtSetInformationThreadHideFromDebugger

  • Suspicious use of SetThreadContext

Related Tasks