Resubmissions

26/11/2023, 09:21

231126-lbtk4agc89 10

26/11/2023, 00:07

231126-aeeessdf63 10

General

  • Target

    New Text Document.bin.zip

  • Size

    1KB

  • Sample

    231126-lbtk4agc89

  • MD5

    7b8cf745b6f7ff0759ce8b0f0094280a

  • SHA1

    088cab8231706aa73e1b4c77caeed47fa9880f04

  • SHA256

    5ba928131e9745c59c4d1f6884ca57cce9a2bfb6a94ca321531ca67852920f25

  • SHA512

    fd5e3a59082b51429a22046a653276f98be7a4c2550c6084356740ef2978707cc1f1701b5cdb55276b2e264ca1d918f928eab7d465374b41818c0088170ffe12

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ricochetsports.in
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9602552987

Extracted

Family

formbook

Version

4.1

Campaign

t2ti

Decoy

j6y.lat

kindlekidz.com

studio352events.com

merelweb.com

6061k.vip

iuk242.com

tiltedjava.net

importmotorshickory.com

codinnotech.com

foodapartcupboardscript.click

donovanmanuel.store

michealwilshire.online

clawenterprises.net

spacecargo.net

duadqps.com

allamericanshuttlellc.com

shucaimh.com

qivovrj.com

infynite1.net

albertcolet.com

Targets

    • Target

      New Text Document.bin

    • Size

      4KB

    • MD5

      a239a27c2169af388d4f5be6b52f272c

    • SHA1

      0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c

    • SHA256

      98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc

    • SHA512

      f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da

    • SSDEEP

      48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Xworm Payload

    • Detect ZGRat V1

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Formbook payload

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks