General

  • Target

    tmp

  • Size

    121KB

  • Sample

    220320-dse52agaal

  • MD5

    b20ca6fe5b3bee70b53659f5faa67363

  • SHA1

    bccd58ad085f34263a2cc4c3763cc8494f1b96d7

  • SHA256

    2feec256a92e51a00f8ed6546bac741beb33beec29225bf74eba71cb6e8562a0

  • SHA512

    24a72e3834004af4fe432c9b616a8e3d3c14c50b9fbba70c70e2f9919cdfcf5e204c5e4c53f78e82c7d18ca764408654143b3ab0fa3e943070b6ec6355156ab1

Score
10/10

Malware Config

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/Clipper/configure.php?cf6zrlhn=jewgod

Wallets

DDB4ERa4pkhQpEzTM2tqH5erkh3kiwsYzi

rMqpEtFcgkDk4Ud5MkPjS2osTabHTYvyQW

0x4f44b62930873e9621d184124bbac2332095B506

XuBivrvExbRDVuxvkQmUEvrTekGE8TqjZn

TLkgaCYHhRAA8JUkDrVAJkG2YLU9ENo2He

t1JZTeSL7rfeM6EFKeHgTXAmeo6duwpS1y7

GAKPS6Z755ZSPBR56BIQVWRVIMHI3WFG3FYMUILI3KT66SM6JE7RY3GM

44r9pF77DzZCr8p9mH3WfqE6CwkYQ9SeB8Kze4ATLgXajcQsBwRrSvvHiaptf5SV5tctJ1b2PAiRgKZpeDX8tXiG1xzXqWw

18ZpXopjXhT4tx77Wq9TaFrBhaYBJSf7nJ

18ZpXopjXhT4tx77Wq9TaFrBhaYBJSf7nJ

0x8ffc221927Fba7F6AF76ddB34079DB81e33522a0

Ltc1q5kk8mmxz00950w5xr79294ekx9uwgf2nc49k9u

ronin:faf1e8b8f87de6e4f6a62dc0b7eaf780ca7b54a0

P1051297956

R902735303552

G561982719682

Z961119277510

H857611132936

X414492391445

[email protected]

Targets

    • Target

      tmp

    • Size

      121KB

    • MD5

      b20ca6fe5b3bee70b53659f5faa67363

    • SHA1

      bccd58ad085f34263a2cc4c3763cc8494f1b96d7

    • SHA256

      2feec256a92e51a00f8ed6546bac741beb33beec29225bf74eba71cb6e8562a0

    • SHA512

      24a72e3834004af4fe432c9b616a8e3d3c14c50b9fbba70c70e2f9919cdfcf5e204c5e4c53f78e82c7d18ca764408654143b3ab0fa3e943070b6ec6355156ab1

    Score
    10/10
    • Allcome

      A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks