General

  • Target

    19256c0962949d65c1338a2f8e94d665_JaffaCakes118

  • Size

    6.1MB

  • Sample

    241006-ws8rfsscpa

  • MD5

    19256c0962949d65c1338a2f8e94d665

  • SHA1

    86b6a631bdeff1c80f39166e81971739080dc506

  • SHA256

    8bb4888c50360987410946aecd7aafd426f851330fc5051dc52ebd2fe7e29063

  • SHA512

    2909bf7f349a77344ed1f65195f09796c23a2a0a79d4e0cd1add850429d9ac71f561ac675628254d0c39f2e77031d5680614de6d326842d6328d9f39b1689297

  • SSDEEP

    196608:sO2z6Qr310VkHZIQpWaZaOR0Sa1ggfbJctBhQw30:RU3aJqaORjgXf6tBhQ

Malware Config

Extracted

Family

vidar

Version

41.1

Botnet

933

C2

https://mas.to/@bardak1ho

Attributes
  • profile_id

    933

Extracted

Family

gcleaner

C2

gcl-page.biz

194.145.227.161

Extracted

Family

redline

Botnet

1

C2

193.203.203.82:63851

Targets

    • Target

      19256c0962949d65c1338a2f8e94d665_JaffaCakes118

    • Size

      6.1MB

    • MD5

      19256c0962949d65c1338a2f8e94d665

    • SHA1

      86b6a631bdeff1c80f39166e81971739080dc506

    • SHA256

      8bb4888c50360987410946aecd7aafd426f851330fc5051dc52ebd2fe7e29063

    • SHA512

      2909bf7f349a77344ed1f65195f09796c23a2a0a79d4e0cd1add850429d9ac71f561ac675628254d0c39f2e77031d5680614de6d326842d6328d9f39b1689297

    • SSDEEP

      196608:sO2z6Qr310VkHZIQpWaZaOR0Sa1ggfbJctBhQw30:RU3aJqaORjgXf6tBhQ

    • Detect Fabookie payload

    • Detects LgoogLoader payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • OnlyLogger payload

    • Vidar Stealer

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks