General
-
Target
RatAlerts.exe
-
Size
36.7MB
-
Sample
240919-qv9tms1gqm
-
MD5
f921e16ca321bbe2e490f036f8b99c74
-
SHA1
6e25638b340ba77f3e467bbbdc27c48209e193af
-
SHA256
6b1700a3961f46120afdf3c5e027556682badcae0015503d533c9f808f214ddc
-
SHA512
04492839ccaeeddc9090b7f6c6458294540bb3e2589108a3c459ae87a11c6cabe6548d80805f37b8bd43616d3645afdabe8b95b9f37c85c06f5c87b137a10274
-
SSDEEP
786432:pjE3Qtst8rW8WZ2YwUlJAdQ/2j6+s7LWB75zuXVgM3MGYS2fAMJLjvZ:a3QtIoWlZ2mlq62qHWB75ilZMGJ24MRN
Behavioral task
behavioral1
Sample
RatAlerts.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
RatAlerts.exe
Resource
win11-20240802-en
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
http://master-x.com/index.php
http://kaspersky.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://kaspersky.ru/index.htm
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Extracted
cybergate
2.7 Beta 02
soso
xsasax.no-ip.info:88
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
windows
-
install_file
windows-help.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
1111
-
regkey_hkcu
windows-dif
-
regkey_hklm
windows
Extracted
xworm
127.0.0.1:14624
button-temp.gl.at.ply.gg:14624
93.183.95.210:5552
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Extracted
emotet
Epoch1
128.92.203.42:80
37.187.161.206:8080
202.29.239.162:443
80.87.201.221:7080
190.188.245.242:80
12.163.208.58:80
213.197.182.158:8080
201.213.177.139:80
62.84.75.50:80
45.33.77.42:8080
185.183.16.47:80
78.249.119.122:80
177.129.17.170:443
51.15.7.189:80
152.169.22.67:80
119.106.216.84:80
109.169.12.78:80
51.15.7.145:80
219.92.13.25:80
190.117.79.209:80
35.143.99.174:80
51.255.165.160:8080
209.236.123.42:8080
70.32.115.157:8080
155.186.0.121:80
177.73.0.98:443
181.129.96.162:8080
45.46.37.97:80
178.250.54.208:8080
68.183.170.114:8080
51.38.124.206:80
203.205.28.68:80
46.43.2.95:8080
65.36.62.20:80
70.116.143.84:80
5.189.178.202:8080
190.115.18.139:8080
74.58.215.226:80
185.94.252.12:80
51.75.33.127:80
190.190.148.27:8080
82.76.111.249:443
137.74.106.111:7080
85.214.26.7:8080
76.168.54.203:80
60.93.23.51:80
188.135.15.49:80
186.103.141.250:443
202.134.4.210:7080
185.232.182.218:80
104.131.41.185:8080
123.51.47.18:80
217.13.106.14:8080
116.202.23.3:8080
186.70.127.199:8090
94.176.234.118:443
5.196.35.138:7080
216.47.196.104:80
96.227.52.8:443
191.182.6.118:80
174.113.69.136:80
87.106.253.248:8080
192.241.146.84:8080
190.24.243.186:80
68.183.190.199:8080
12.162.84.2:8080
189.2.177.210:443
98.13.75.196:80
185.94.252.27:443
64.201.88.132:80
149.202.72.142:7080
172.104.169.32:8080
181.74.0.251:80
87.106.46.107:8080
60.108.144.104:443
170.81.48.2:80
67.247.242.247:80
212.71.237.140:8080
202.4.58.197:80
189.35.44.221:80
138.97.60.141:7080
50.121.220.50:80
2.36.95.106:80
177.74.228.34:80
83.169.21.32:7080
111.67.12.221:8080
192.81.38.31:80
70.169.17.134:80
77.238.212.227:80
61.197.92.216:80
82.230.1.24:80
95.9.180.128:80
50.28.51.143:8080
70.32.84.74:8080
1.226.84.243:8080
192.241.143.52:8080
181.30.61.163:443
74.136.144.133:80
45.33.35.74:8080
Extracted
emotet
Epoch2
38.18.235.242:80
5.196.108.189:8080
121.124.124.40:7080
104.236.246.93:8080
113.61.66.94:80
120.150.60.189:80
91.211.88.52:7080
47.144.21.12:443
108.46.29.236:80
139.162.108.71:8080
134.209.36.254:8080
139.59.60.244:8080
66.65.136.14:80
76.175.162.101:80
174.106.122.139:80
95.213.236.64:8080
174.45.13.118:80
50.35.17.13:80
209.141.54.221:8080
87.106.139.101:8080
96.249.236.156:443
176.111.60.55:8080
85.96.199.93:80
87.106.136.232:8080
97.82.79.83:80
185.94.252.104:443
79.98.24.39:8080
142.112.10.95:20
5.196.74.210:8080
94.1.108.190:443
24.137.76.62:80
121.7.127.163:80
37.139.21.175:8080
213.196.135.145:80
83.169.36.251:8080
24.179.13.119:80
137.59.187.107:8080
181.169.34.190:80
139.130.242.43:80
42.200.107.142:80
140.186.212.146:80
74.208.45.104:8080
188.219.31.12:80
105.186.233.33:80
93.147.212.206:80
194.187.133.160:443
61.19.246.238:443
85.152.162.105:80
5.39.91.110:7080
71.72.196.159:80
24.43.99.75:80
139.162.60.124:8080
124.41.215.226:80
67.10.155.92:80
109.74.5.95:8080
78.187.156.31:80
195.7.12.8:80
187.49.206.134:80
123.176.25.234:80
157.245.99.39:8080
78.188.106.53:443
94.200.114.161:80
94.23.237.171:443
104.251.33.179:80
68.252.26.78:80
75.139.38.211:80
103.86.49.11:8080
62.75.141.82:80
172.104.97.173:8080
79.137.83.50:443
110.142.236.207:80
162.241.242.173:8080
78.24.219.147:8080
91.146.156.228:80
118.83.154.64:443
216.139.123.119:80
121.7.31.214:80
181.169.235.7:80
139.99.158.11:443
172.91.208.86:80
46.105.131.79:8080
104.131.11.150:443
110.145.77.103:80
82.80.155.43:80
168.235.67.138:7080
50.91.114.38:80
137.119.36.33:80
203.153.216.189:7080
37.187.72.193:8080
24.43.32.186:80
130.0.132.242:80
80.241.255.202:8080
220.245.198.194:80
190.240.194.77:443
89.216.122.92:80
1.221.254.82:80
104.131.44.150:8080
62.30.7.67:443
Extracted
C:\Users\Public\Documents\RGNR_1AE990F6.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Targets
-
-
Target
RatAlerts.exe
-
Size
36.7MB
-
MD5
f921e16ca321bbe2e490f036f8b99c74
-
SHA1
6e25638b340ba77f3e467bbbdc27c48209e193af
-
SHA256
6b1700a3961f46120afdf3c5e027556682badcae0015503d533c9f808f214ddc
-
SHA512
04492839ccaeeddc9090b7f6c6458294540bb3e2589108a3c459ae87a11c6cabe6548d80805f37b8bd43616d3645afdabe8b95b9f37c85c06f5c87b137a10274
-
SSDEEP
786432:pjE3Qtst8rW8WZ2YwUlJAdQ/2j6+s7LWB75zuXVgM3MGYS2fAMJLjvZ:a3QtIoWlZ2mlq62qHWB75ilZMGJ24MRN
-
Adds autorun key to be loaded by Explorer.exe on startup
-
Ardamax main executable
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload
-
Detects MyDoom family
-
GandCrab payload
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Squirrelwaffle payload
-
XMRig Miner payload
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
3File Deletion
3Modify Registry
12Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Network Share Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1