General

  • Target

    9d227eb3f4ff27c39d61130fae6458b06a33ee315a6e2a8fd84afe08d49ce553.exe

  • Size

    1.0MB

  • Sample

    220206-pbf7jsaad8

  • MD5

    253732efc73b152f1f2d496413ed232c

  • SHA1

    9d7d404930cf891bf54a034bf9c9f943e42fba14

  • SHA256

    9d227eb3f4ff27c39d61130fae6458b06a33ee315a6e2a8fd84afe08d49ce553

  • SHA512

    a57e998e52e961056f84160a00dd60f2f8f8715f9f69d5fce9845367ce53560848152bf074a801ed46c1f0cb8ff071b9f5bb630de9045febac77168b3badff6f

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

raccoon

Botnet

125d9f8ed76e486f6563be097a710bd4cba7f7f2

Attributes
  • url4cnc

    http://5.252.178.180/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

oski

C2

pretorian.ug

Targets

    • Target

      9d227eb3f4ff27c39d61130fae6458b06a33ee315a6e2a8fd84afe08d49ce553.exe

    • Size

      1.0MB

    • MD5

      253732efc73b152f1f2d496413ed232c

    • SHA1

      9d7d404930cf891bf54a034bf9c9f943e42fba14

    • SHA256

      9d227eb3f4ff27c39d61130fae6458b06a33ee315a6e2a8fd84afe08d49ce553

    • SHA512

      a57e998e52e961056f84160a00dd60f2f8f8715f9f69d5fce9845367ce53560848152bf074a801ed46c1f0cb8ff071b9f5bb630de9045febac77168b3badff6f

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks