Resubmissions

21-09-2024 17:07

240921-vnbeqatelr 7

21-09-2024 11:57

240921-n4mz5a1bqd 666

General

  • Target

    DoomRat.exe

  • Size

    12.1MB

  • Sample

    240921-n4mz5a1bqd

  • MD5

    9b13e58ef5dcfa319ff36e8dc040c248

  • SHA1

    d97589619b4ba09b458888db1e93d08ff9a4d2e4

  • SHA256

    513be2fa1186d385753fb7132ff2b786bf7cc8651b7d8c12dc242e3857eee143

  • SHA512

    3a60282fdba5c70e0825c81b705c3d13721241605165ae28bd4fa59bdbbe2d6e4c666ce5d1a4475fc764d355eca9a6af607180bc46c7a7b938cf514e6944c9a0

  • SSDEEP

    393216:4GV2CSQhZ2YsHFUK2Jn1+TtIiFQS2NXNsI8VbTToP:HYQZ2YwUlJn1QtIm28IKzo

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://asboywnrihlvdsbpigftigzyb20gyw5vbnltb3vz.ru/cmfwe2

exe.dropper

https://drive.google.com/uc?export=download&id=

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.controlfire.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    0a4XlE=4t8mz

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://89.197.154.116:7810/dDmZLRctSF-O2Y_Y6DNv7gGR1g00Lo-DSbAP10Qhyakl6e3RBIKZx4eGRNsN-6iE5mPtUWD3pQadMjciytVqzPL

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://master-x.com/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://crutop.ru/index.php

http://kaspersky.ru/index.php

http://color-bank.ru/index.php

http://adult-empire.com/index.php

http://virus-list.com/index.php

http://trojan.ru/index.php

http://xware.cjb.net/index.htm

http://konfiskat.org/index.htm

http://parex-bank.ru/index.htm

http://fethard.biz/index.htm

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

Extracted

Family

emotet

Botnet

Epoch3

C2

190.192.39.136:80

5.189.168.53:8080

162.241.41.111:7080

190.85.46.52:7080

190.190.15.20:80

181.95.133.104:80

41.212.89.128:80

115.176.16.221:80

143.95.101.72:8080

75.127.14.170:8080

116.202.10.123:8080

74.208.173.91:8080

103.93.220.182:80

50.116.78.109:8080

67.121.104.51:20

180.26.62.115:443

139.59.12.63:8080

76.18.16.210:80

113.161.148.81:80

5.79.70.250:8080

rsa_pubkey.plain

Extracted

Family

emotet

Botnet

Epoch2

C2

38.18.235.242:80

5.196.108.189:8080

121.124.124.40:7080

104.236.246.93:8080

113.61.66.94:80

120.150.60.189:80

91.211.88.52:7080

47.144.21.12:443

108.46.29.236:80

139.162.108.71:8080

134.209.36.254:8080

139.59.60.244:8080

66.65.136.14:80

76.175.162.101:80

174.106.122.139:80

95.213.236.64:8080

174.45.13.118:80

50.35.17.13:80

209.141.54.221:8080

87.106.139.101:8080

rsa_pubkey.plain

Targets

    • Target

      DoomRat.exe

    • Size

      12.1MB

    • MD5

      9b13e58ef5dcfa319ff36e8dc040c248

    • SHA1

      d97589619b4ba09b458888db1e93d08ff9a4d2e4

    • SHA256

      513be2fa1186d385753fb7132ff2b786bf7cc8651b7d8c12dc242e3857eee143

    • SHA512

      3a60282fdba5c70e0825c81b705c3d13721241605165ae28bd4fa59bdbbe2d6e4c666ce5d1a4475fc764d355eca9a6af607180bc46c7a7b938cf514e6944c9a0

    • SSDEEP

      393216:4GV2CSQhZ2YsHFUK2Jn1+TtIiFQS2NXNsI8VbTToP:HYQZ2YwUlJn1QtIm28IKzo

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Detect Blackmoon payload

    • Disables service(s)

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects Floxif payload

    • Emotet payload

      Detects Emotet payload in memory.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Network Share Discovery

      Attempt to gather information on host network.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks