General

  • Target

    718f04d2621e01180741c1c22836dbff20edd690bb9a9101a976db949504a8bb

  • Size

    322KB

  • Sample

    221208-ez56gaha34

  • MD5

    306b9c981fd5ae87d39c3ac96f5f1f74

  • SHA1

    c36b7f95e74bc339261c75e7b854848deaccf24f

  • SHA256

    718f04d2621e01180741c1c22836dbff20edd690bb9a9101a976db949504a8bb

  • SHA512

    293691dd787eab5caad6ccbd0599ad232f0caa2da967787c8c00c84c8c7e020291e089104bfa15205cb7f45e353e9630a85c994fc9d314404c7d65ef3336979e

  • SSDEEP

    3072:kswKctqcf7CZB4585bOOWUl6OSWlduKCn/7BLdGL79zf6jlykn4lOV2tQ4ew7ubo:ktI/uy6Q/U0nhfYlys4lOCq3bD/dfxm

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://cdn.discordapp.com/attachments/1049569242455998544/1049862157858242560/string4633.err

Extracted

Language
ps1
Source
URLs
exe.dropper

https://cdn.discordapp.com/attachments/1049569242455998544/1049862157594021948/string792.err

Extracted

Family

amadey

Version

3.50

C2

62.204.41.6/p9cWxH/index.php

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/sauydga27/

Extracted

Family

redline

Botnet

wosh

C2

31.41.244.14:4683

Attributes
  • auth_value

    f0ec85e2aaa9e62929e2fb9e09d843f4

Extracted

Family

redline

Botnet

001

C2

77.73.133.31:42560

Attributes
  • auth_value

    331f5da5a4dc98f4b4878a0f7479df35

Targets

    • Target

      718f04d2621e01180741c1c22836dbff20edd690bb9a9101a976db949504a8bb

    • Size

      322KB

    • MD5

      306b9c981fd5ae87d39c3ac96f5f1f74

    • SHA1

      c36b7f95e74bc339261c75e7b854848deaccf24f

    • SHA256

      718f04d2621e01180741c1c22836dbff20edd690bb9a9101a976db949504a8bb

    • SHA512

      293691dd787eab5caad6ccbd0599ad232f0caa2da967787c8c00c84c8c7e020291e089104bfa15205cb7f45e353e9630a85c994fc9d314404c7d65ef3336979e

    • SSDEEP

      3072:kswKctqcf7CZB4585bOOWUl6OSWlduKCn/7BLdGL79zf6jlykn4lOV2tQ4ew7ubo:ktI/uy6Q/U0nhfYlys4lOCq3bD/dfxm

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks