General

  • Target

    0214a83066744fa9dabfbbab848dd420efa04504f4f6c47d0cc9ca26c27c7296

  • Size

    400KB

  • Sample

    221015-y8dblagbdj

  • MD5

    d62d262a25f19a48bbd76bb694d1e64a

  • SHA1

    76230c3a2731fd4c4e714631324285e509a2d928

  • SHA256

    0214a83066744fa9dabfbbab848dd420efa04504f4f6c47d0cc9ca26c27c7296

  • SHA512

    a77340b74e00ffb9da1717e78a77d7f5bf90df50e2092ddc087c2e65a92ed9ee3abb1c452af0bca1019b308001a9ee03ff0141b6fc05818a46a893b7998ca95d

  • SSDEEP

    6144:7x4TPn85bE5yXi3T7bR5t0MnwkGex0ua07v0uA06d0K19GoIRO743LNPae0WhHra:7x4z83S3F5ufkUW843Lwe0YBDLw

Malware Config

Extracted

Family

privateloader

C2

http://163.123.143.4/proxies.txt

http://107.182.129.251/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

163.123.143.12

http://91.241.19.125/pub.php?pub=one

http://sarfoods.com/index.php

Attributes
  • payload_url

    https://vipsofts.xyz/files/mega.bmp

Extracted

Family

nymaim

C2

45.15.156.54

85.31.46.167

Extracted

Family

redline

Botnet

Nigh

C2

80.66.87.20:80

Attributes
  • auth_value

    dab8506635d1dc134af4ebaedf4404eb

Targets

    • Target

      0214a83066744fa9dabfbbab848dd420efa04504f4f6c47d0cc9ca26c27c7296

    • Size

      400KB

    • MD5

      d62d262a25f19a48bbd76bb694d1e64a

    • SHA1

      76230c3a2731fd4c4e714631324285e509a2d928

    • SHA256

      0214a83066744fa9dabfbbab848dd420efa04504f4f6c47d0cc9ca26c27c7296

    • SHA512

      a77340b74e00ffb9da1717e78a77d7f5bf90df50e2092ddc087c2e65a92ed9ee3abb1c452af0bca1019b308001a9ee03ff0141b6fc05818a46a893b7998ca95d

    • SSDEEP

      6144:7x4TPn85bE5yXi3T7bR5t0MnwkGex0ua07v0uA06d0K19GoIRO743LNPae0WhHra:7x4z83S3F5ufkUW843Lwe0YBDLw

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detects Smokeloader packer

    • Modifies Windows Defender Real-time Protection settings

    • NyMaim

      NyMaim is a malware with various capabilities written in C++ and first seen in 2013.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks