General

  • Target

    C082990403156E860FC5397A9D28D44325BCB24D24A97.exe

  • Size

    16.5MB

  • Sample

    220126-2stkesbean

  • MD5

    8dbea443ed6b1c5c65b8d2b5b2fee229

  • SHA1

    c28671d261a7307d1e67e41a76e26c665ebb83eb

  • SHA256

    c082990403156e860fc5397a9d28d44325bcb24d24a97ad048f1d311a5109451

  • SHA512

    6f24b1e5bf205c9d4414a2c4b27117a1763583947a837ef7cfbd00378b86c2fd59d7d3b5e243560a53a28375e8a5ad55b38d5bf802a642684e48db63c5c7044a

Malware Config

Extracted

Family

socelars

C2

http://www.yarchworkshop.com/

Extracted

Family

redline

Botnet

v1user1

C2

159.69.246.184:13127

Extracted

Family

redline

Botnet

@Tui

C2

185.215.113.44:23759

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

4da27d123a577c68e42716053343dd3f8da508a2

Attributes
  • url4cnc

    http://91.219.236.27/borderxra

    http://94.158.245.167/borderxra

    http://185.163.204.216/borderxra

    http://185.225.19.238/borderxra

    http://185.163.204.218/borderxra

    https://t.me/borderxra

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

03.12_BUILD_3

C2

45.9.20.221:15590

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

efc20640b4b1564934471e6297b87d8657db774a

Attributes
  • url4cnc

    http://91.219.236.162/jredmankun

    http://185.163.47.176/jredmankun

    http://193.38.54.238/jredmankun

    http://74.119.192.122/jredmankun

    http://91.219.236.240/jredmankun

    https://t.me/jredmankun

rc4.plain
rc4.plain

Targets

    • Target

      C082990403156E860FC5397A9D28D44325BCB24D24A97.exe

    • Size

      16.5MB

    • MD5

      8dbea443ed6b1c5c65b8d2b5b2fee229

    • SHA1

      c28671d261a7307d1e67e41a76e26c665ebb83eb

    • SHA256

      c082990403156e860fc5397a9d28d44325bcb24d24a97ad048f1d311a5109451

    • SHA512

      6f24b1e5bf205c9d4414a2c4b27117a1763583947a837ef7cfbd00378b86c2fd59d7d3b5e243560a53a28375e8a5ad55b38d5bf802a642684e48db63c5c7044a

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

      suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • OnlyLogger Payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks