General

  • Target

    ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833.exe

  • Size

    24.5MB

  • Sample

    240909-bpwx9sxdmc

  • MD5

    a5ca2d3b20cf191139a47d7261916d9e

  • SHA1

    5d56e08cc55731f96db03911dba96dcdf22bcac8

  • SHA256

    ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833

  • SHA512

    e008b76d8040ef039424e6f7eec37b866fc7ab71d1cb11d839b4d4449758b3b8174249c353d1726ed736cb9c854cafda7648aee7a12c93d8a8e0cd0013a0c3ad

  • SSDEEP

    49152:qnUSstktA/zuJuuS6FDlUhBKds9he3qUtM9l58uRgG+vTD7o9qa910rUo29xqcUt:ql

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

great-it.gl.at.ply.gg:11149

Mutex

4d5861675348411506f0e029827092c2

Attributes
  • reg_key

    4d5861675348411506f0e029827092c2

  • splitter

    Y262SUCZ4UJJ

Extracted

Family

njrat

Version

im523

Botnet

puked

C2

147.185.221.20:47570

Mutex

20006afb0ec33f2e48c8c1f17d4d3382

Attributes
  • reg_key

    20006afb0ec33f2e48c8c1f17d4d3382

  • splitter

    |'|'|

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7293375371:AAFwIvNWcuknS3y3mtsx4yNSSTkj8NCF_ko/sendMessage?chat_id=5795480469

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

njrat

Version

0.7d

Botnet

чучундра

C2

hakim32.ddns.net:2000

safety-bronze.gl.at.ply.gg:4444

Mutex

27b92504703b09d3ee2dae0873e8e3f3

Attributes
  • reg_key

    27b92504703b09d3ee2dae0873e8e3f3

  • splitter

    |'|'|

Extracted

Family

remcos

Botnet

AUGUST CRYPTER TOOLZ GRACE STUB

C2

teamfavour222.ddns.net :6767

odogwuvisual123.duckdns.org:6767

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    -YFLE4M

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Path

C:\MSOCache\FNVBDKPICB-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.3 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE WILL BE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .FNVBDKPICB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/c951e4b9a594702b | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- wfKD6iudumBkmpL8IRr4U4exEVaoOXLtwDwmOrT1y1YWvOiWMx5GYaRdvZZUTpRRtHYd7m5WsbfSTHCHhh5qBJzzs9MC7736UkGSDDniUJJG8/LFF//kmGmoAZAGLo2j5/wd2UrxMJK+iqKhTkS3ArgAxrZOOOiXrbnhbWMkLHQnbYuWlMClYZxYU6SDxpopRo5r292AV1KIZBZV4APBuUHcKSIr2MWMI0O1MKIP2IpKLE2TS5wLmpQodXZhP6M/UPrO1sZzkDbgjYlAG3g8l65nVd0/CBUxKQ7KDJYrtX0vSmnFXg/ykfgtJNiwqfCnqbr85+BisLF7kU3B4eLx/2I2Q+svGopYaVqKBiPtqhHWEdsb8ycE4oG4b6a1Y8ZyGoyp2Q2iuJRzTRoqGlPQJIAJppFrwNIoDBPOnKw+A+5ZALufjGEwg7NrKg3qxA9Kxg7zZivpABFI3v3LNuar1wYZLXRgRl+KCjmo1jngAX95mSffmizzQU1nmrIqlsew6HIMVY3pdDfwfAscdcBnP3FNhn9WQ3XC06ZCEvXtdUj8BYRMbJHwHowOP7+LRYsPy4knV/fu67PJzMP9LnZDh5szqewLRaRtAf+EbjLWu+IPXpBeLdQo9FRha1KO2vpgy2mFLQkzlAtXfjb5QmECiQ== ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/c951e4b9a594702b

Extracted

Family

lokibot

C2

http://45.133.1.20/oluwa/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.42:5552

Mutex

bf7b1fe7a7644171a9985ea45221c25c

Attributes
  • reg_key

    bf7b1fe7a7644171a9985ea45221c25c

  • splitter

    |'|'|

Extracted

Family

njrat

Version

0.7d

Botnet

kosomk 555

C2

dovelabobzgnan.ddns.net:5552

Mutex

a8c0d4cf5cfc2cc1149b5e071c2ab5df

Attributes
  • reg_key

    a8c0d4cf5cfc2cc1149b5e071c2ab5df

  • splitter

    |'|'|

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\QMVOIJHDZB-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.3 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE WILL BE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .QMVOIJHDZB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/ca8d3564116fccd2 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/ca8d3564116fccd2

Extracted

Family

xloader

Version

2.6

Campaign

eido

Decoy

revellbb.com

tempranillowine.net

viralstrategies.info

blacktxu.com

flfththirdbank.com

vaoex.com

theselfdirectedinvestor.com

vinadelmar.travel

othersidejimmythemonkey.com

jaguar-landrovercenter-graz.com

supremeosterreich.com

chatsubs.com

free99.design

serviciosmvs.com

bongmecams.xyz

malikwoodson.com

onlinegamebox.club

694624.com

yeezyzapatos.club

istanbul-hairtransplant.com

Targets

    • Target

      ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833.exe

    • Size

      24.5MB

    • MD5

      a5ca2d3b20cf191139a47d7261916d9e

    • SHA1

      5d56e08cc55731f96db03911dba96dcdf22bcac8

    • SHA256

      ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833

    • SHA512

      e008b76d8040ef039424e6f7eec37b866fc7ab71d1cb11d839b4d4449758b3b8174249c353d1726ed736cb9c854cafda7648aee7a12c93d8a8e0cd0013a0c3ad

    • SSDEEP

      49152:qnUSstktA/zuJuuS6FDlUhBKds9he3qUtM9l58uRgG+vTD7o9qa910rUo29xqcUt:ql

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Async RAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (168) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Xloader payload

    • Adds policy Run key to start application

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • System Binary Proxy Execution: Verclsid

      Adversaries may abuse Verclsid to proxy execution of malicious code.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks