General

  • Target

    b2b09138f6bd625c119b4baae4133f3583ccc1e19f0e883fd31171f2a39a5f3e.bin

  • Size

    291KB

  • Sample

    220718-mrzmqabfa2

  • MD5

    ffb8152ef40edc5c178d228b9c96a06d

  • SHA1

    83bc9bc18e5d4e68add42624838827308e6cdafc

  • SHA256

    b2b09138f6bd625c119b4baae4133f3583ccc1e19f0e883fd31171f2a39a5f3e

  • SHA512

    8b10109b48851decc3a6d4dc5bb977c25e72988af79d241fe7bd049b6080358ac76ce59540024e6401fb61d12386e6b07e32966e85563d6f46d31f66ae81ccb3

Score
10/10

Malware Config

Extracted

Family

vulturi

C2

http://52.188.26.40:5050/gate

Attributes
  • c2_encryption_key

    welovefortnite

  • c2_user

    root

Targets

    • Target

      b2b09138f6bd625c119b4baae4133f3583ccc1e19f0e883fd31171f2a39a5f3e.bin

    • Size

      291KB

    • MD5

      ffb8152ef40edc5c178d228b9c96a06d

    • SHA1

      83bc9bc18e5d4e68add42624838827308e6cdafc

    • SHA256

      b2b09138f6bd625c119b4baae4133f3583ccc1e19f0e883fd31171f2a39a5f3e

    • SHA512

      8b10109b48851decc3a6d4dc5bb977c25e72988af79d241fe7bd049b6080358ac76ce59540024e6401fb61d12386e6b07e32966e85563d6f46d31f66ae81ccb3

    Score
    10/10
    • Vulturi

      An info stealer written in C# and first seen in January 2021.

    • Vulturi payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks