Resubmissions

17-09-2023 21:42

230917-1kqywsfc99 10

09-09-2023 02:55

230909-denv1sha92 10

06-09-2023 17:13

230906-vrxr5aaa71 10

13-08-2023 17:31

230813-v3xlhafe8v 10

27-06-2023 12:47

230627-p1fx3sfa4w 10

13-06-2023 16:07

230613-tklwlsgh96 10

General

  • Target

    a.zip

  • Size

    832B

  • Sample

    230917-1kqywsfc99

  • MD5

    10e578867faad166dc6a8f3868cef2f4

  • SHA1

    f541fab60d482834e90638c5aebdefe3d997174e

  • SHA256

    6fe03f61ee89f37688356f14ee8dc2d0c001e0d43281fad29386270a9c71c92c

  • SHA512

    38389b61e71eed9a9587900f60d59c145d070d0e02602f473c284befcd4898b1191f1982e71463c9cbe17ea36f4ec6c17d665f072e730981eae00fd805863114

Malware Config

Extracted

Family

redline

Botnet

Invoice

C2

147.124.213.118:50826

Extracted

Family

xworm

Version

3.0

C2

topics-junior.at.ply.gg:45283

Attributes
  • install_file

    explorer.exe

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

amadey

Version

3.83

C2

http://5.42.65.80/8bmeVwqx/index.php

Attributes
  • install_dir

    207aa4515d

  • install_file

    oneetx.exe

  • strings_key

    3e634dd0840c68ae2ced83c2be7bf0d4

rc4.plain

Extracted

Family

redline

Botnet

@Black_Santa21

C2

94.142.138.4:80

Attributes
  • auth_value

    5a06838de858adf9064d7d2c59f0d1f6

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Extracted

Family

nanocore

Version

1.2.2.0

C2

thecookieisthere.duckdns.org:8209

Mutex

b60838e1-f181-4bc5-939a-25e80b7d7815

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    thecookieisthere.duckdns.org

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2023-06-25T10:41:59.706866036Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    8209

  • default_group

    Cookie

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    b60838e1-f181-4bc5-939a-25e80b7d7815

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    thecookieisthere.duckdns.org

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Extracted

Family

agenttesla

Credentials

Extracted

Family

stealc

C2

http://171.22.28.221

Attributes
  • url_path

    /5c06c05b7b34e8e6.php

rc4.plain

Targets

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks