Resubmissions

15-06-2023 04:44

230615-fda9msef7s 10

15-06-2023 04:22

230615-ezhp6sef24 10

General

  • Target

    2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734

  • Size

    5.0MB

  • Sample

    230615-ezhp6sef24

  • MD5

    890e29d78179dc4611286b863c50df53

  • SHA1

    7bee367b02f66898b9ffb0f2569ca79c04edc19a

  • SHA256

    2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734

  • SHA512

    3b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08

  • SSDEEP

    98304:I95KeVzJFLYDAQlsumF2SEGKhq1v/28fV4AAc0cq9FcFzUkKm:ArQm2FGKq28tIbWzSm

Malware Config

Extracted

Family

amadey

Version

3.80

C2

45.15.156.208/jd9dd3Vw/index.php

second.amadgood.com/jd9dd3Vw/index.php

Extracted

Family

redline

Botnet

Load_Am_130623

C2

165.22.100.96:81

Attributes
  • auth_value

    c7e984e13f7f42d18969a2259aeadc52

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79

Targets

    • Target

      2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734

    • Size

      5.0MB

    • MD5

      890e29d78179dc4611286b863c50df53

    • SHA1

      7bee367b02f66898b9ffb0f2569ca79c04edc19a

    • SHA256

      2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734

    • SHA512

      3b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08

    • SSDEEP

      98304:I95KeVzJFLYDAQlsumF2SEGKhq1v/28fV4AAc0cq9FcFzUkKm:ArQm2FGKq28tIbWzSm

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks