General

  • Target

    setup.exe

  • Size

    1.0MB

  • Sample

    230410-a87y7sga4s

  • MD5

    b017aaeb77e31aba8124c523dd73fed1

  • SHA1

    b233d66c70cfbc47b968d6b956404dfb4ae1a77b

  • SHA256

    3fd434aaeeb28a63bcc365c2ba6b4ecede696db3b24d6c4ebd1276d0681894ae

  • SHA512

    c62ee4cdea26ec5ac1ba4bc43430811a6e25b8f5e5b1f7805a99cf27ebdaecac1b4e7865a980d8987d886ca099bc09d81998aaca375ff814a3c5c63b39c1f61f

  • SSDEEP

    24576:Ny78CGXmQt/NgdemzRyxBpXw/y9/Hfvhcl:o78HWQtFmzMBF/9fn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lego

C2

176.113.115.145:4125

Attributes
  • auth_value

    5631ccac2c71d49629a3877d1a8ad354

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

eternity

C2

http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion

Extracted

Family

redline

Botnet

0409Lucky-bot

C2

135.181.101.75:33666

Targets

    • Target

      setup.exe

    • Size

      1.0MB

    • MD5

      b017aaeb77e31aba8124c523dd73fed1

    • SHA1

      b233d66c70cfbc47b968d6b956404dfb4ae1a77b

    • SHA256

      3fd434aaeeb28a63bcc365c2ba6b4ecede696db3b24d6c4ebd1276d0681894ae

    • SHA512

      c62ee4cdea26ec5ac1ba4bc43430811a6e25b8f5e5b1f7805a99cf27ebdaecac1b4e7865a980d8987d886ca099bc09d81998aaca375ff814a3c5c63b39c1f61f

    • SSDEEP

      24576:Ny78CGXmQt/NgdemzRyxBpXw/y9/Hfvhcl:o78HWQtFmzMBF/9fn

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Gurcu

      Gurcu stealer is a malware written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks