Resubmissions

15-01-2022 06:10

220115-gw6c6sdcgk 8

15-01-2022 06:09

220115-gwqbysdcgj 7

15-01-2022 06:03

220115-gseq2sdcdq 10

General

  • Target

    Adobe Acrobat Pro DC 2021 v21.011.20039 + Fix\1. Setup\Setup\Setup.exe

  • Size

    489KB

  • Sample

    220115-gseq2sdcdq

  • MD5

    eff4079af246d3fc6e31e6e3e632d92a

  • SHA1

    e51611bdd103d9d9cabcb69835ab6e014ba625cd

  • SHA256

    f9fa40de449e4c55744ae67eb0f25138de6212e828a6cb407c403d0610e787ea

  • SHA512

    5632425e7d61908ab3bfacd30e804d598535fbdba2e42a1226ec8ef27f37d39acbadc7c2a53f0dbb282ce4ce2ad8f12d0fa66511d0e54c568fc22d7a8f754a50

Malware Config

Extracted

Family

netwire

C2

alice2019.myftp.biz:3360

Attributes
  • activex_autorun

    false

  • activex_key

  • copy_executable

    false

  • delete_original

    false

  • host_id

    BESTOF2021

  • install_path

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • startup_name

  • use_mutex

    false

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

alice2019.myftp.biz:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

alice2019.myftp.biz:7777

Mutex

984d46ff6d3349978a

Targets

    • Target

      Adobe Acrobat Pro DC 2021 v21.011.20039 + Fix\1. Setup\Setup\Setup.exe

    • Size

      489KB

    • MD5

      eff4079af246d3fc6e31e6e3e632d92a

    • SHA1

      e51611bdd103d9d9cabcb69835ab6e014ba625cd

    • SHA256

      f9fa40de449e4c55744ae67eb0f25138de6212e828a6cb407c403d0610e787ea

    • SHA512

      5632425e7d61908ab3bfacd30e804d598535fbdba2e42a1226ec8ef27f37d39acbadc7c2a53f0dbb282ce4ce2ad8f12d0fa66511d0e54c568fc22d7a8f754a50

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

    • Async RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks