Resubmissions

12/04/2024, 14:40

240412-r19aqsec6y 10

12/04/2024, 14:40

240412-r18n7sec6x 10

12/04/2024, 14:36

240412-rylfwsbc28 10

12/04/2024, 14:36

240412-rykvcsec4t 10

12/04/2024, 14:36

240412-rykjlaec4s 8

09/04/2024, 07:38

240409-jgem1shg29 8

09/04/2024, 07:38

240409-jgdqqahg28 10

09/04/2024, 07:38

240409-jgc47ada4y 10

09/04/2024, 07:38

240409-jgctesda4v 8

25/12/2023, 04:54

231225-fjlybsahbr 7

General

  • Target

    2cdc39f39a9369ae4062822ea6726f2e508d5d29514b3cee06f809ce6ef16250

  • Size

    1.9MB

  • Sample

    240412-r18n7sec6x

  • MD5

    59646583129acf5244d686f15aadb25a

  • SHA1

    5b8b55dc12217eb37bd25ca61cd7aceec729e603

  • SHA256

    2cdc39f39a9369ae4062822ea6726f2e508d5d29514b3cee06f809ce6ef16250

  • SHA512

    99a4c6612de866f966f2b9f84c16ada59d3606db942011d720debe12f4b059a9aec1b7c1046231b15ae728b6a27e616056588680aa3ebcbf0340a4d6eeddb9b2

  • SSDEEP

    49152:Qe6RRRpEHQN/ThQrezxMQnXW8qaJZkRLagEoH6gFt:Q9nLEcrhhmYLwpbE+t

Malware Config

Extracted

Credentials

Extracted

Credentials

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    futuria.be
  • Port:
    21
  • Username:
    patrick

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    marchand-knapen.com
  • Port:
    21
  • Username:
    webmaster

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    marchand-knapen.com
  • Port:
    21
  • Username:
    admin

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    marchand-knapen.com
  • Port:
    21
  • Username:
    marchand-knapen

Extracted

Credentials

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    manitoba.be
  • Port:
    21
  • Username:
    marie

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    tangeraas.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    tangeraaS1adqa219

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    tangeraas.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    tangeraaS1!!aeae123

Targets

    • Target

      2cdc39f39a9369ae4062822ea6726f2e508d5d29514b3cee06f809ce6ef16250

    • Size

      1.9MB

    • MD5

      59646583129acf5244d686f15aadb25a

    • SHA1

      5b8b55dc12217eb37bd25ca61cd7aceec729e603

    • SHA256

      2cdc39f39a9369ae4062822ea6726f2e508d5d29514b3cee06f809ce6ef16250

    • SHA512

      99a4c6612de866f966f2b9f84c16ada59d3606db942011d720debe12f4b059a9aec1b7c1046231b15ae728b6a27e616056588680aa3ebcbf0340a4d6eeddb9b2

    • SSDEEP

      49152:Qe6RRRpEHQN/ThQrezxMQnXW8qaJZkRLagEoH6gFt:Q9nLEcrhhmYLwpbE+t

    • Contacts a large (727) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks