General

  • Target

    The-MALWARE-Repo

  • Size

    299KB

  • Sample

    240824-qvnamsthpm

  • MD5

    f3f3aac86e729e4a3836e73123e23af8

  • SHA1

    c6723d14f1a98bfce7ca58969e8beb86649181dd

  • SHA256

    10926df6beb49f7b302faef5b57bcfbcfe9e55bed9e95d71ee5284ff271e7a51

  • SHA512

    ed24eab0d5aaf0108bcd9a487a80965663a12dbc7309620d3ed70c12e5fd4faa9a4230656f776d95050355c52486717e4110dcc506d557e4d90e59e1e541c7f0

  • SSDEEP

    6144:8bo4S3uokeOvHS1d1+CNs8wbiWQO9hvZJT3CqbMrhryf65NRPaCieMjAkvCJv1V7:6o4S3uokeOvHS1d1+CNs8wbiWQO9hvZQ

Malware Config

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Extracted

Family

crimsonrat

C2

185.136.161.124

Extracted

Family

lokibot

C2

http://blesblochem.com/two/gates1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      The-MALWARE-Repo

    • Size

      299KB

    • MD5

      f3f3aac86e729e4a3836e73123e23af8

    • SHA1

      c6723d14f1a98bfce7ca58969e8beb86649181dd

    • SHA256

      10926df6beb49f7b302faef5b57bcfbcfe9e55bed9e95d71ee5284ff271e7a51

    • SHA512

      ed24eab0d5aaf0108bcd9a487a80965663a12dbc7309620d3ed70c12e5fd4faa9a4230656f776d95050355c52486717e4110dcc506d557e4d90e59e1e541c7f0

    • SSDEEP

      6144:8bo4S3uokeOvHS1d1+CNs8wbiWQO9hvZJT3CqbMrhryf65NRPaCieMjAkvCJv1V7:6o4S3uokeOvHS1d1+CNs8wbiWQO9hvZQ

    • Chimera

      Ransomware which infects local and network files, often distributed via Dropbox links.

    • Chimera Ransomware Loader DLL

      Drops/unpacks executable file which resembles Chimera's Loader.dll.

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Renames multiple (248) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Warzone RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks