General

  • Target

    0153AD4D1224B9A37B2EB3264EA7F8685828AB18C9C49.exe

  • Size

    4.4MB

  • Sample

    220531-y29ffsgbcr

  • MD5

    eea2d2cad5ff13c5a693d8d74a823395

  • SHA1

    bb546b645ac1a213dab1c012217fc840ecf36f9e

  • SHA256

    0153ad4d1224b9a37b2eb3264ea7f8685828ab18c9c49aecaa6bda39d914aa7a

  • SHA512

    911bd5bfde2e14925fb5075404ed97489f7b60a5a377bd6d4103b1ade94d7ec0e1e5c7987af2d4ac2d218c76603824a3704998b3077d964249ee53448204a617

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.efxety.top/

Extracted

Family

redline

Botnet

media23

C2

91.121.67.60:23325

Attributes
  • auth_value

    e37d5065561884bb54c8ed1baa6de446

Extracted

Family

redline

Botnet

ChrisNEW

C2

194.104.136.5:46013

Attributes
  • auth_value

    9491a1c5e11eb6097e68a4fa8627fda8

Extracted

Family

redline

Botnet

SNOVA

C2

95.217.225.59:40037

Attributes
  • auth_value

    a1f0fea73f3aaf037ac33a2a80aaba03

Extracted

Family

djvu

C2

http://ugll.org/test3/get.php

Attributes
  • extension

    .zfdv

  • offline_id

    nt0jroKkg7EBU5sTqFhyx2ReZFxjNBwgKCdXuRt1

  • payload_url

    http://zerit.top/dl/build2.exe

    http://ugll.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-anHzdHdUMF Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: admin@helpdata.top Reserve e-mail address to contact us: supportsys@airmail.cc Your personal ID: 0489JIjdm

rsa_pubkey.plain

Targets

    • Target

      0153AD4D1224B9A37B2EB3264EA7F8685828AB18C9C49.exe

    • Size

      4.4MB

    • MD5

      eea2d2cad5ff13c5a693d8d74a823395

    • SHA1

      bb546b645ac1a213dab1c012217fc840ecf36f9e

    • SHA256

      0153ad4d1224b9a37b2eb3264ea7f8685828ab18c9c49aecaa6bda39d914aa7a

    • SHA512

      911bd5bfde2e14925fb5075404ed97489f7b60a5a377bd6d4103b1ade94d7ec0e1e5c7987af2d4ac2d218c76603824a3704998b3077d964249ee53448204a617

    • Detected Djvu ransomware

    • Djvu Ransomware

      Ransomware which is a variant of the STOP family.

    • Modifies Windows Defender Real-time Protection settings

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

      suricata: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses

    • suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

      suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

    • OnlyLogger Payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks