General
-
Target
Red rp.rar
-
Size
47.9MB
-
Sample
240606-ldq8racd3t
-
MD5
0fc85541d339b28785b614dffc280d65
-
SHA1
190f04fe928e9c400529d5300465fb80d2285f5d
-
SHA256
479e80f23b0799ead92adcd6fd52b03a65d73218d55596688817c431afd3df16
-
SHA512
653c193351a899d8f892e8b21f6f549dfc0c3c3455e0b58c0ce44337316a330877568cb087cb1b8c33d2528900ff0696c67157b1964c9a280e2369505a4368f7
-
SSDEEP
786432:c4YUTvsd6NYoyh3VoROg1r5fbTyWLH/Hr5fbTy8mYor5fbTy8mYsr5fbTy8mYRL/:mUTvsENrAloRDj/yWLfN/y8mY8/y8mY4
Static task
static1
Malware Config
Extracted
https://drive.usercontent.google.com/u/0/uc?id=1ZRO0JMVWlqdCkDiMau3Ea7O_ARtuQLab&export=download
Extracted
phemedrone
https://api.telegram.org/bot7274515778:AAEx4SxiDLjUG8dht4Cac1HVmxqTSwD_yL4/sendDocument
Targets
-
-
Target
Red rp/Info.txt
-
Size
118B
-
MD5
d23ef20d600b65222c2923db0e00bca7
-
SHA1
b373a929772e7f271f85c94b6ad72accea9b56f2
-
SHA256
fde6b8381e7ce1650718f24b070ea21e0140ba385593d36d65261dc2497524dc
-
SHA512
e926580d882e2839f8ec2aa40901c979a5d796c958d512f51e4bd2def7d50f38410d4bacefec4570420aa7678fb71468d36a9b13d3c71b0dd73eb8ae208ae019
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2