General
-
Target
x.exe
-
Size
11.6MB
-
Sample
241004-rejg7ascqf
-
MD5
b70e25d81a43083343ef6b7c0ef8f8f1
-
SHA1
fa752c62bbb7dd3b8074b6d479a03299f903768f
-
SHA256
391ea76992d59b0b366f6cb36a46aef9132cde2c201d37385a82dcbac68b4bac
-
SHA512
c7d6c03ad4ce4843336128ab034840e5a13c7dc0cfd8d8612af2118c89c3571471ed7834d8cd708f709253fbdb0c9c9a0f0659c4aa53ec1249ea91a1556d7c36
-
SSDEEP
196608:Vwnv86gV1rbQQOOl2szsHFUK2r7UyTAdQmR8dA6li8Qnf2ODjMnGydScSEPVrBO8:0WV9hZ2YsHFUK2JAdQJlqF3MnG3tOVr5
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
x.exe
-
Size
11.6MB
-
MD5
b70e25d81a43083343ef6b7c0ef8f8f1
-
SHA1
fa752c62bbb7dd3b8074b6d479a03299f903768f
-
SHA256
391ea76992d59b0b366f6cb36a46aef9132cde2c201d37385a82dcbac68b4bac
-
SHA512
c7d6c03ad4ce4843336128ab034840e5a13c7dc0cfd8d8612af2118c89c3571471ed7834d8cd708f709253fbdb0c9c9a0f0659c4aa53ec1249ea91a1556d7c36
-
SSDEEP
196608:Vwnv86gV1rbQQOOl2szsHFUK2r7UyTAdQmR8dA6li8Qnf2ODjMnGydScSEPVrBO8:0WV9hZ2YsHFUK2JAdQJlqF3MnG3tOVr5
-
Cobalt Strike reflective loader
Detects the reflective loader used by Cobalt Strike.
-
Detect Blackmoon payload
-
Detect Neshta payload
-
Detects MyDoom family
-
Detects Renamer worm.
Renamer aka Grename is worm written in Delphi.
-
Gh0st RAT payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
XMRig Miner payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
3Windows Service
3Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1