General

  • Target

    ab30bb947e01c244a019178e7f3c91f1.exe

  • Size

    10.7MB

  • Sample

    211216-ndpq2acfep

  • MD5

    ab30bb947e01c244a019178e7f3c91f1

  • SHA1

    53a269707333b61b5729f6a69a64658463a9404c

  • SHA256

    665d4b7c4bec54b430a47f22608d377f3a96775cf5edfee297265e385461266e

  • SHA512

    38a756e8fdd81edbf563d171571b987621aba31a216c15e13e77bf97044bcb6131eedec7b6300b812e8aaf5de2c65f46254be92511c65e7aeb2cb8c02ae66764

Malware Config

Extracted

Family

socelars

C2

http://www.yarchworkshop.com/

Extracted

Family

vidar

Version

49

Botnet

915

C2

https://mstdn.social/@sergeev43

https://koyu.space/@sergeev45

Attributes
  • profile_id

    915

Extracted

Family

redline

Botnet

03.12_BUILD_3

C2

45.9.20.221:15590

Targets

    • Target

      ab30bb947e01c244a019178e7f3c91f1.exe

    • Size

      10.7MB

    • MD5

      ab30bb947e01c244a019178e7f3c91f1

    • SHA1

      53a269707333b61b5729f6a69a64658463a9404c

    • SHA256

      665d4b7c4bec54b430a47f22608d377f3a96775cf5edfee297265e385461266e

    • SHA512

      38a756e8fdd81edbf563d171571b987621aba31a216c15e13e77bf97044bcb6131eedec7b6300b812e8aaf5de2c65f46254be92511c65e7aeb2cb8c02ae66764

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE GCleaner Downloader Activity M5

      suricata: ET MALWARE GCleaner Downloader Activity M5

    • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

      suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

      suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

      suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

      suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks