General

  • Target

    i864x__setup__622bbc23f088c.zip

  • Size

    6.3MB

  • Sample

    220314-nfec3seeb7

  • MD5

    5163f3272f4ef8c5a5b6c4a5a0ca36e5

  • SHA1

    ce60d7779b53c3671d8922a5f05bcbfa31cd7734

  • SHA256

    e95b255a652ac51d977ea179ababe0e4c652afe07a37f8a9afc324a640705927

  • SHA512

    ca4d4d1f173c845ca6b076d455e20319bec61c688d2dcd33ab631297c573d257d423e37d732c3009d13dcd83f79e45369af7e9203fa37b3b92a0419f92efba7a

Malware Config

Extracted

Family

socelars

C2

https://sa-us-bucket.s3.us-east-2.amazonaws.com/asdhjk/

Extracted

Family

smokeloader

Version

2020

C2

http://coralee.at/upload/

http://ducvietcao.com/upload/

http://biz-acc.ru/upload/

http://toimap.com/upload/

http://bbb7d.com/upload/

http://piratia-life.ru/upload/

http://curvreport.com/upload/

http://viagratos.com/upload/

http://mordo.ru/upload/

http://pkodev.net/upload/

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

media1120112

C2

92.255.57.154:11841

Attributes
  • auth_value

    2948163485fe8e04db7acc17e8a19406

Extracted

Family

redline

Botnet

ww

C2

193.106.191.67:44400

Attributes
  • auth_value

    5a1b28ccd05953f5c3f99729c12427cc

Targets

    • Target

      i864x__setup__622bbc23f088c.exe

    • Size

      6.4MB

    • MD5

      42c477e367dca72c9794c8c1564dcfd8

    • SHA1

      224b760e32e56b7047f35c76ba9959b9f406c804

    • SHA256

      feba9bf42249bc45378ea0c07e476dc7bbf2ec9665db5981757d37b75ebab3ca

    • SHA512

      f77555ef2492ac1ad9dc0b0dae7c74364f8e42daadcbb564435b105dacc316e9817ee1a30987adf55870833fe1e219776411cc8d5f4aa5a6c9dc046aa861bb4e

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • OnlyLogger Payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks