General

  • Target

    669bb51bb539eaeb45c9163670d84c84

  • Size

    3.9MB

  • Sample

    240119-d9lzxaebhj

  • MD5

    669bb51bb539eaeb45c9163670d84c84

  • SHA1

    b54d4d19cd239b5ce601df691690419fe66e661e

  • SHA256

    6537dc51442beed86b6cf785a5f3f5525aa9bebb25cadd3f38399797adf14259

  • SHA512

    a19823991645c724d0fcc36a4245af971a1eaf3909c268adf809a1bc212a6c09f13d2f394dab3c64dafba1504b34eccfd908b8f1f12cc09b31162b3c5766c9f3

  • SSDEEP

    49152:9g+VxojDZfHdIX8A/DL/T+Uao5CcD67o31cDhBd8ADzUnrU2Yz0SihIwRHpmLEcZ:yKuhHoNao5CcD67o31KB2EoaUH/xa

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.171/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.185

Extracted

Family

redline

Botnet

pab3

C2

185.215.113.15:61506

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Extracted

Family

cryptbot

C2

knucsj38.top

mornui03.top

Attributes
  • payload_url

    http://sarpuk04.top/download.php?file=lv.exe

Targets

    • Target

      669bb51bb539eaeb45c9163670d84c84

    • Size

      3.9MB

    • MD5

      669bb51bb539eaeb45c9163670d84c84

    • SHA1

      b54d4d19cd239b5ce601df691690419fe66e661e

    • SHA256

      6537dc51442beed86b6cf785a5f3f5525aa9bebb25cadd3f38399797adf14259

    • SHA512

      a19823991645c724d0fcc36a4245af971a1eaf3909c268adf809a1bc212a6c09f13d2f394dab3c64dafba1504b34eccfd908b8f1f12cc09b31162b3c5766c9f3

    • SSDEEP

      49152:9g+VxojDZfHdIX8A/DL/T+Uao5CcD67o31cDhBd8ADzUnrU2Yz0SihIwRHpmLEcZ:yKuhHoNao5CcD67o31KB2EoaUH/xa

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      setup_installer.exe

    • Size

      3.8MB

    • MD5

      28636401da782ddf74e654e6d946af76

    • SHA1

      0f080abd03c143f54bb0cbc7ac682b0c828a000c

    • SHA256

      3d7ba99d7b360819146cd6223b2d668e8b1a661023f5b36932860bc84271eecd

    • SHA512

      ddf9fe38abe2662d77422875607a9dae6a7b949236cb47730754ea69129daabf270df5edde6b3ec31929c394129c389058c81193c573baa3dfa9941bc3e9b298

    • SSDEEP

      98304:xRCvLUBsgni5rb8JnSl9yaBVnzTuSE5wkDb4V6Tr7J:x6LUCgi5rb8ol9RtE5wkAM1

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks