Resubmissions

23-09-2024 07:59

240923-jvnsvazdnq 4

21-09-2024 13:07

240921-qczwqatdjc 10

General

  • Target

    https://cdn.discordapp.com/attachments/1256009606883442768/1286063807256465428/onibye-1.7.2.exe?ex=66efd781&is=66ee8601&hm=738f6adda77c7359d50d8cfcc2eba4c2e011200276b4c324ba552594c969d3af&

  • Sample

    240921-qczwqatdjc

Malware Config

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Extracted

Family

crimsonrat

C2

185.136.161.124

Extracted

Family

lumma

C2

https://achievenmtynwjq.shop/api

Targets

    • Target

      https://cdn.discordapp.com/attachments/1256009606883442768/1286063807256465428/onibye-1.7.2.exe?ex=66efd781&is=66ee8601&hm=738f6adda77c7359d50d8cfcc2eba4c2e011200276b4c324ba552594c969d3af&

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • RevengeRat Executable

    • Warzone RAT payload

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks