General

  • Target

    e86bd2f91bdba3094c973a84c2abfe4268b9e226feed083ea796a336b4eeebad

  • Size

    366KB

  • Sample

    221210-zj4b6agb82

  • MD5

    820c28a8a9ce4214528056c72e0f2a51

  • SHA1

    9480a429dd8852d2c1ba27072eac159e230da086

  • SHA256

    e86bd2f91bdba3094c973a84c2abfe4268b9e226feed083ea796a336b4eeebad

  • SHA512

    02a213cfac7a9f8e3b5dba4ec3dcf7fe52cb23513de6f1eaa2c2b6b1755fe462b8541f351999dba571612fc7c7b503a1b6512cc3b22308214cbf45fd717d2752

  • SSDEEP

    6144:VBX1bRjLPTvTICfrErz0o1puR62ya0ICcEv+PkJ90ZrrMC7C:VhXDTvTnfrw0LRzya0+MfGRQEC

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.237/jg94cVd30f/index.php

62.204.41.6/p9cWxH/index.php

Extracted

Family

redline

Botnet

Nosh

C2

31.41.244.186:4683

Attributes
  • auth_value

    b8a171b8f2a42502e350c6a85f0c8271

Extracted

Family

redline

Botnet

NewwwwTOp35

C2

185.106.92.214:2515

Attributes
  • auth_value

    3f21a7afb8f3b6b912dd762b77ead441

Extracted

Family

redline

Botnet

1000

C2

45.138.16.105:30305

Attributes
  • auth_value

    f6b1c4710203eb058a238c757fb8b59b

Extracted

Family

remcos

Botnet

ppi_lab

C2

tridengames.duckdns.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    vfgadf.exe

  • copy_folder

    gdfgdsa

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    sdfsh.dat

  • keylog_flag

    false

  • keylog_folder

    asdfadf

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    vhgddfew-8BXF80

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    hgffgdfg

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

vidar

Version

56.1

Botnet

1569

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    1569

Targets

    • Target

      e86bd2f91bdba3094c973a84c2abfe4268b9e226feed083ea796a336b4eeebad

    • Size

      366KB

    • MD5

      820c28a8a9ce4214528056c72e0f2a51

    • SHA1

      9480a429dd8852d2c1ba27072eac159e230da086

    • SHA256

      e86bd2f91bdba3094c973a84c2abfe4268b9e226feed083ea796a336b4eeebad

    • SHA512

      02a213cfac7a9f8e3b5dba4ec3dcf7fe52cb23513de6f1eaa2c2b6b1755fe462b8541f351999dba571612fc7c7b503a1b6512cc3b22308214cbf45fd717d2752

    • SSDEEP

      6144:VBX1bRjLPTvTICfrErz0o1puR62ya0ICcEv+PkJ90ZrrMC7C:VhXDTvTnfrw0LRzya0+MfGRQEC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks