General

  • Target

    12740963278.zip

  • Size

    3.7MB

  • Sample

    231108-l8y7vahe7t

  • MD5

    fe88ee57db82e5768bcdcfb4d787a39a

  • SHA1

    9ad627334500a403290043eadc741c94b74e7c34

  • SHA256

    85fe94a88b9473bbc1a7f292885326bd164e6a7d8cff2232bd716ea367fd6914

  • SHA512

    bc1045526c18c906641f09b57e28e09dc5c9557f3458af3e659b8388dfd68851abe76653cf0e2575e609aaf3c9fcc264b63b8db8bd3fa39f102ad8aa40051898

  • SSDEEP

    98304:OLOTxEsYarjA36KQ9XLpOZVkjfZ7IPjbEWGLHgsM1LEG+:OyTCa3AqvezkjR7ILbEWYJ

Malware Config

Extracted

Family

milleniumrat

C2

https://api.telegram.org/bot6597086550:AAH-iMklHZd9G4OC7i-qH_lJ-F4S0eEVjPM/sendMessage?chat_id=2024893777

Targets

    • Target

      6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

    • Size

      5.3MB

    • MD5

      eba4be8ed0e9282976f8ee0b04fb2474

    • SHA1

      f4d698ece0ff6af36c1a2e9108ea475518df0aa7

    • SHA256

      6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

    • SHA512

      cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

    • SSDEEP

      98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR

    • MilleniumRat

      MilleniumRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks