General

  • Target

    archive-240424-09_04_33.rar

  • Size

    2.8MB

  • Sample

    240424-1k4vraac78

  • MD5

    1df6c96761557f51b4adf7f9f11c4e5d

  • SHA1

    f06e8f20c94406c8682faf120d8dfcdb85a4caf3

  • SHA256

    b1990f2a3293feff29504cbbaf7d89570e40561811d403b2a3482bb5f9657ed8

  • SHA512

    795e33cacfdc07bc91954361c04dbd102119207f8850cd5c135dade36786ef374c30a5092ffffed2c697983024774fa4fb3d48a55639bcbce5f9e9e4c8544469

  • SSDEEP

    49152:Mm5k/6YvIoutOur/ufwVzJ+aICUwi3wZnrcWtgdjKV+rosKD6PWrMRubEA:Mm5kCAIX7QwH+CZlcugEyorEEWubEA

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://dsepc5ud74wta.cloudfront.net/load/th.php

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://dsepc5ud74wta.cloudfront.net/load/dl.php?id=425

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://dsepc5ud74wta.cloudfront.net/load/dl.php?id=444

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199677575543

https://t.me/snsb82

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.96:28380

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      setup.exe

    • Size

      737.0MB

    • MD5

      1ab2fa2a485b12b6a62dc256e5caf388

    • SHA1

      39ee02acab790c9127aab5b47915658f2be97d22

    • SHA256

      a2a2c5619ac3d9bf610129768d3022d33784112dff11ccfaf2e9d3977f02206a

    • SHA512

      36afe500094e88b4002d99e9ce3a14298def1a46efbbbefcad6fcaccebe406a1c995ad279bd4228477106a7b61ed61d2ffd228d7abdf3628342f777fba3eef9b

    • SSDEEP

      49152:ekHK08F5Y6JLmcH6o4TaC/h4L12/UGkPDR7EhoOl9Ynvrp4egCtUgJJJIFctC0I:e/F2sLRhkaCgwKMkvrpdtD4G5I

    • Detect Vidar Stealer

    • Detect ZGRat V1

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Modifies firewall policy service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Stealc

      Stealc is an infostealer written in C++.

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

3
T1543

Windows Service

3
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

3
T1543

Windows Service

3
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

3
T1112

Virtualization/Sandbox Evasion

1
T1497

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks