General
-
Target
showcase.zip
-
Size
6.8MB
-
Sample
220624-qw33gscfak
-
MD5
0259f0150a31d2fcc9f009a961243b54
-
SHA1
ddb27c245b32032ae4a1c9922d6c2312d709578c
-
SHA256
96995eadf0555a4f7759c817a64f58810b64a423ab172ac809c373f381d5cd3e
-
SHA512
0e1b5e353ebbe9481f20f9d8d7d04178b5c320acc0e2e052036e814566d52901cd1c83ad028b6629ecad3632b92c00918fe81b0a38390249542a0eb7db1931e9
Static task
static1
Behavioral task
behavioral1
Sample
filecoder.dmg
Resource
macos-20220504-en
Behavioral task
behavioral2
Sample
flawedammyy.exe
Resource
win7-20220414-en
Behavioral task
behavioral3
Sample
flawedammyy.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral4
Sample
qakbot.dll
Resource
win7-20220414-en
Behavioral task
behavioral5
Sample
qakbot.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral6
Sample
redline.exe
Resource
win7-20220414-en
Behavioral task
behavioral7
Sample
redline.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral8
Sample
seon.exe
Resource
win7-20220414-en
Behavioral task
behavioral9
Sample
seon.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
qakbot
402.68
tr
1619706851
24.117.107.120:443
190.85.91.154:443
72.252.201.69:443
189.210.115.207:443
71.41.184.10:3389
81.97.154.100:443
50.29.166.232:995
140.82.49.12:443
75.137.47.174:443
71.74.12.34:443
73.25.124.140:2222
149.28.99.97:2222
45.77.115.208:2222
45.32.211.207:995
207.246.116.237:443
149.28.99.97:443
207.246.77.75:443
149.28.98.196:995
207.246.116.237:2222
45.77.115.208:8443
207.246.77.75:995
207.246.77.75:2222
45.32.211.207:443
95.77.223.148:443
45.32.211.207:8443
149.28.98.196:2222
144.202.38.185:443
207.246.77.75:8443
207.246.116.237:8443
149.28.101.90:2222
45.77.117.108:8443
45.77.117.108:443
149.28.98.196:443
45.77.117.108:2222
149.28.99.97:995
149.28.101.90:443
45.77.115.208:995
144.202.38.185:2222
149.28.101.90:995
144.202.38.185:995
45.77.115.208:443
45.32.211.207:2222
45.77.117.108:995
149.28.101.90:8443
207.246.116.237:995
98.192.185.86:443
24.139.72.117:443
216.201.162.158:443
47.196.192.184:443
47.22.148.6:443
71.187.170.235:443
151.205.102.42:443
75.67.192.125:443
24.179.77.148:443
197.45.110.165:995
105.198.236.99:443
136.232.34.70:443
71.163.222.243:443
105.198.236.101:443
45.63.107.192:995
144.139.47.206:443
115.133.243.6:443
27.223.92.142:995
76.25.142.196:443
75.118.1.141:443
50.244.112.106:443
45.46.53.140:2222
173.21.10.71:2222
98.252.118.134:443
45.63.107.192:443
45.63.107.192:2222
109.12.111.14:443
24.55.112.61:443
172.78.36.91:443
73.151.236.31:443
188.26.91.212:443
24.229.150.54:995
72.240.200.181:2222
67.165.206.193:993
67.8.103.21:443
24.226.156.153:443
186.31.46.121:443
81.214.126.173:2222
92.59.35.196:2222
92.96.3.180:2078
108.29.32.102:443
78.63.226.32:443
96.37.113.36:993
86.133.126.195:443
83.196.56.65:2222
83.110.108.100:2222
24.152.219.253:995
184.185.103.157:443
195.6.1.154:2222
76.168.147.166:993
86.220.62.251:2222
97.69.160.4:2222
90.65.236.181:2222
96.61.23.88:995
64.121.114.87:443
222.153.174.162:995
77.27.207.217:995
24.95.61.62:443
77.211.30.202:995
125.62.192.220:443
195.12.154.8:443
68.186.192.69:443
71.117.132.169:443
96.21.251.127:2222
71.199.192.62:443
70.168.130.172:995
82.12.157.95:995
209.210.187.52:995
209.210.187.52:443
67.6.12.4:443
189.222.59.177:443
174.104.22.30:443
142.117.191.18:2222
189.146.183.105:443
213.60.147.140:443
196.221.207.137:995
108.46.145.30:443
187.250.238.164:995
2.7.116.188:2222
195.43.173.70:443
106.250.150.98:443
45.67.231.247:443
83.110.103.152:443
83.110.9.71:2222
78.97.207.104:443
59.90.246.200:443
80.227.5.69:443
125.63.101.62:443
86.236.77.68:2222
109.106.69.138:2222
84.72.35.226:443
217.133.54.140:32100
197.161.154.132:443
89.137.211.239:995
74.222.204.82:995
122.148.156.131:995
156.223.110.23:443
144.139.166.18:443
202.185.166.181:443
76.94.200.148:995
71.63.120.101:443
196.151.252.84:443
202.188.138.162:443
74.68.144.202:443
69.58.147.82:2078
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Extracted
redline
KREATOR
45.140.146.214:20498
Extracted
C:\MSOCache\YOUR_FILES_ARE_ENCRYPTED.TXT
Extracted
C:\Users\Admin\AppData\Local\Temp\readme.hta
Targets
-
-
Target
filecoder.dmg
-
Size
2.5MB
-
MD5
5557a06822358ea7814891631f7df8ce
-
SHA1
f6e215ed5a1623de05c6f63033aa4f6d1a5696d6
-
SHA256
f8dd1edd285ba0ee23250d7925dd7c230aaf3845ceedb6bcfe2913815c8775db
-
SHA512
a592d44e8942dd223792baf0180bb4d06d0d9e0e2740a64c86c89435cefc3a704acc86ab0caee207eb549f7e8eaee777b66178bd4ac7f7c331d981b7e40a0d5b
Score1/10 -
-
-
Target
flawedammyy
-
Size
3.6MB
-
MD5
743a6891999db5d7179091aba5f98fdb
-
SHA1
eeca4b8f88fcae9db6f54304270699d459fb5722
-
SHA256
fe9d72dd4b046bafdd144902ab570297629f83d06afb5a9ba7703382a29d588f
-
SHA512
9edef033663c828536190332ec87ac0096ffddae934d17c51b255a55ecb05774211a0edb1915c19384641befa291cfdfd2e3f878bf3b827f8b203ec1bee9dd96
Score10/10-
AmmyyAdmin Payload
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
qakbot
-
Size
959KB
-
MD5
2dc87224ef9349f4b281f11fb43ed3f4
-
SHA1
e19c8174793560817c522e3f206f6434ebf4b342
-
SHA256
31c42d854a77c7673a3438df6501c3a09ee530f6f4f23cc7bea891cec7bc096b
-
SHA512
1d492db541796480d4f4c987f4ab7abd49ba6caf6da8bed419893d658ce5325e3cd672d9fef7a58986f2262ef18775ad1e435358a1b797cf271cea99474f0874
-
Loads dropped DLL
-
-
-
Target
redline
-
Size
569KB
-
MD5
4842156a83bbc8f5b1b46b0e2a597ab4
-
SHA1
bdda0f367bf93fa75e2bf4b632daab8b615c9c69
-
SHA256
24dc9485b3fcea21dc81118d045d6bd13ca40f04dcc905662b70f4ed5754f003
-
SHA512
f0fe9c63fc8fd1333297b76f7f0ed414535ffb4f8ab96906c8207840bf63688d8b6e0de8053e7882eeb616ddf83c8021d5940adc9fcba4e8fd1e342c67343f73
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of SetThreadContext
-
-
-
Target
seon
-
Size
62KB
-
MD5
7d3573bee1a9acd192c50bc72a65ef7a
-
SHA1
8ff77e69046c8cecd4407c536219e6fc1a747af7
-
SHA256
221ab2fabe92b623834e7214d05dbef0cdc2b4399d34721de63e7c32ab5820ea
-
SHA512
dcf3998861c2c1818d05ba526134edddee58bea51d4065ec5d156dfac2d24a63d65df057a1319e0886bdf37a394f82fb4435c0292c3e1f135646623ad3aaf347
Score10/10-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-