Resubmissions

04-06-2023 19:29

230604-x7lqxaea5x 10

11-05-2023 23:54

230511-3x28ssba52 10

11-05-2023 21:10

230511-zz6gfsch6y 10

General

  • Target

    money generator.dat

  • Size

    5KB

  • Sample

    230511-zz6gfsch6y

  • MD5

    8c72631836822bafd97a2bd198261322

  • SHA1

    2f0975e53ce034637d83b3d8df4a30fd5db29c50

  • SHA256

    be44bee1f8fe8f7a4aa42fc8e0c9e8ab37bd4e0a724a5e0d1f817c6cbf5f8745

  • SHA512

    12240570eed4948d967dcec1dae5261c3a450a1b3c45b4f8df90c4a6499865d8f6e4df47f573abfb28e30495a00aa55de3e3b87b1193f527cc25ce958004c6c4

  • SSDEEP

    96:BEumoTbuz1Kuz1yluz15dnX1GqDUtLv8e7cpRuw5bzNt:BvmoP0K0yl05J1Gq2Lv8ecRD9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/r.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/file.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/o.png

Extracted

Family

smokeloader

Botnet

sprg

Extracted

Family

smokeloader

Version

2022

C2

http://hoh0aeghwugh2gie.com/

http://hie7doodohpae4na.com/

http://aek0aicifaloh1yo.com/

http://yic0oosaeiy7ahng.com/

http://wa5zu7sekai8xeih.com/

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

3.8

Botnet

cdb48fb567690db37648afd4e1d83137

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    cdb48fb567690db37648afd4e1d83137

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Extracted

Family

lokibot

C2

http://171.22.30.164/kung/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.thereccorp.com
  • Port:
    587
  • Username:
    onuma.b@thereccorp.com
  • Password:
    O@123456
  • Email To:
    resultscott2@gmail.com

Targets

    • Target

      money generator.dat

    • Size

      5KB

    • MD5

      8c72631836822bafd97a2bd198261322

    • SHA1

      2f0975e53ce034637d83b3d8df4a30fd5db29c50

    • SHA256

      be44bee1f8fe8f7a4aa42fc8e0c9e8ab37bd4e0a724a5e0d1f817c6cbf5f8745

    • SHA512

      12240570eed4948d967dcec1dae5261c3a450a1b3c45b4f8df90c4a6499865d8f6e4df47f573abfb28e30495a00aa55de3e3b87b1193f527cc25ce958004c6c4

    • SSDEEP

      96:BEumoTbuz1Kuz1yluz15dnX1GqDUtLv8e7cpRuw5bzNt:BvmoP0K0yl05J1Gq2Lv8ecRD9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • XMRig Miner payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

1
T1089

File Deletion

2
T1107

Impair Defenses

1
T1562

Scripting

1
T1064

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

7
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

2
T1490

Service Stop

1
T1489

Tasks