General

  • Target

    https://cdn-lv3.de/download/941427/the-redcodi-website?k=XJbuWCC4k79Er1HwDmxge9L8uXMOGVq5

  • Sample

    230827-c77yxsfa86

Malware Config

Targets

    • Target

      https://cdn-lv3.de/download/941427/the-redcodi-website?k=XJbuWCC4k79Er1HwDmxge9L8uXMOGVq5

    • Cobalt Strike reflective loader

      Detects the reflective loader used by Cobalt Strike.

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Discovery

System Information Discovery

1
T1082

Tasks