Resubmissions

08-06-2024 02:24

240608-cvn1aaff5x 8

08-06-2024 02:06

240608-cjt26agd83 10

General

  • Target

    File_ver3.rar

  • Size

    7.1MB

  • Sample

    240608-cjt26agd83

  • MD5

    e00ce0fed5e235a7b637f1f99b40d03c

  • SHA1

    bbcc47fcd49c92e488eb049c34080d4ab83e5e6c

  • SHA256

    f5eb4c418e14eb104bfe49e49be961c903ed740279b97035d6d0ce6f8758f34e

  • SHA512

    29e837ee8bbaba998ce8f24492ee0e0e7c7393eea23ca03b8ba851d7edcda475e4fce98f225d232366ad9a70434b756d6141637c756f96daa25de733fb3b39c3

  • SSDEEP

    196608:bbd77/lAUOQxWJ9x8fuvv/VGC+G+Of2t2fZ:bbd7CJz+m/VVuq2AfZ

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/r8z0l

https://steamcommunity.com/profiles/76561199698764354

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.63:14707

Targets

    • Target

      concrt140.dll

    • Size

      309KB

    • MD5

      31f210ed5c6f2d8faa1d896cda18584b

    • SHA1

      5444d919f5014fb6bf58cefc6f01088c32a24a00

    • SHA256

      5393f592cded7bd8ae07b2afc3efdcc4a0b05f7e8e74380a267398266fc02d41

    • SHA512

      d39aa7acfd982759825b537a9ca5b04e6cdd9c0a28089e0f666ae4b75e84e2e2e58180103da38bea79efe3252cb9f1932efa69b64461cb76173645e8b6ddf3f6

    • SSDEEP

      6144:Ylm+bq4hSdOec4xWMXdtvo4KbrniIzb7wQjnWzgCE33g:pmP/eJXzvSCzW3g

    Score
    1/10
    • Target

      msvcp140.dll

    • Size

      576KB

    • MD5

      a11a1d761d757d367146f0f772632d8c

    • SHA1

      9fd3eee4c4111dc386510a930192d56a2e938dfe

    • SHA256

      2cc02c5e6654aa9175d5963f811cac222f4a2604dc28553139c675b1a78995a7

    • SHA512

      6fbbb77766ee9846d6d3bde2ced5eeaafe721de5524a410a4821dfa6c08edbd00905bec2b9237b8f7986d6d06dbe444c5845130193da537cadaf29ea784c48e1

    • SSDEEP

      12288:fFrCZUcfGI/O+bE9krdFFM5lle0dkM4X2n08ukSIAg6wQEKZm+jWodEEVrR+:9rCZUNYX2nSkGg6wQEKZm+jWodEE9R+

    Score
    1/10
    • Target

      res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc

    • Size

      114KB

    • MD5

      a2f3ded45da8870e93e5d2186dab27e8

    • SHA1

      3f8e0cddecc3827b33ec02cd78d192c18f1ddf82

    • SHA256

      fc19237a4e9ae65829dbde384ce0de2c78b22d9577384dded9d4cde569a12742

    • SHA512

      438621491061c7f14f59c48d0d2fdd637a17c058df13417e21d660d81632dbb826a6144032f6f9192ab9bb0afb46b8f6cf3982879dc9942261c2538dbd17187c

    • SSDEEP

      3072:k6BVH7SBjeSCbupKVfG2yQJ23J+Svsy9k/TukuPMh:zrbKeWmDyQ+13kOPMh

    Score
    3/10
    • Target

      setup.exe

    • Size

      631.4MB

    • MD5

      1e88e52ae4838a0aa179c21784cbbb4a

    • SHA1

      b218793843ee4af2842b5182d241ea0f121abffa

    • SHA256

      763711499a127ef7f46615a3275ef62afa097d65e948e98678b81fa0e0315cad

    • SHA512

      89dfe218101559d02524f548d806504a90987c9c66f8f7d8280dc0446bdaeebdf00725f479c5cc99db37b589d19f37b8a229157164690eca3698f9c0480f1110

    • SSDEEP

      98304:rOuBF3zj5prjsd8VNCofaoUhXo8uG9pmSgQ7gCbHRd3bcEo:qunj5prvX8uGxgQZLcEo

    • Detect Vidar Stealer

    • Modifies firewall policy service

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Stealc

      Stealc is an infostealer written in C++.

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks