General

  • Target

    roblox.zip

  • Size

    7.5MB

  • Sample

    240812-hk9f5atgna

  • MD5

    6be589444f1aad7b257ad7e348c548a7

  • SHA1

    84954e7c1b90ad3c89e956ffa703e8f31f254b31

  • SHA256

    975399eb76e2c5a1d553ecd8975ab361261ccab8fd9412b8060b19877cb4e0d5

  • SHA512

    5fde1a7d8482c487034aea3e59435693904d9e18c23ce2e108a6a4978111a0a343c8021ca8fbe768b86047f7e1c9a8ee719eda31ad717f9d224d5806c484e9c4

  • SSDEEP

    196608:QSNc5fLVkT9di3oStojt2jVJ0nQdGhLb50pHUP4nqryZ:ELVkRdi3oPjt4Uq0P4nqrw

Malware Config

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

nickman12-46565.portmap.io:46565

nickman12-46565.portmap.io:1735

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    Userdata.exe

  • copy_folder

    Userdata

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    remcos_vcexssuhap

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

modiloader

C2

https://drive.google.com/u/0/uc?id=1TcSctGVBajYMA7CFDc158wpvqkpxmkhJ&export=download

Extracted

Family

crimsonrat

C2

185.136.161.124

Targets

    • Target

      loopMIDISetup.exe

    • Size

      7.8MB

    • MD5

      15c25cb0b677f25e6f284bdaa20b6716

    • SHA1

      4b28b8a997f58021c2cb072c3724546827badff8

    • SHA256

      86db060b586b57dbeeaab32412602a9dd7f9e4298ab7586e667b7e7dbcf60ed6

    • SHA512

      2241c86c930176ddc47838033b1865831ce102d59484cd88cdf712572d5c8f87ffa8778dab10db35599c12c7510697bc5a58ab724f130e8663e62d5d4d983b62

    • SSDEEP

      196608:5BGCFYswTDdyFoSVIhb6VHNCZwF03eP9GwFnQH8dqDiF:5tbw3dyFo/hbUYWQH8dqDi

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • UAC bypass

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Detects Floxif payload

    • ModiLoader First Stage

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • RevengeRat Executable

    • Warzone RAT payload

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops startup file

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies Windows Firewall

    • Drops file in System32 directory

    • Modifies WinLogon for persistence

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks