General
-
Target
RNSM00466.7z
-
Size
83.9MB
-
Sample
241007-yb4ghssbmm
-
MD5
add9b95cfef4f7b5e89946205f16a572
-
SHA1
077667fb23e0b48936714b8d4a54f162203a934a
-
SHA256
133c0ba06c58e2b694c42135545d7554b3d6e37ad752bd6a3fa97b5577cd6033
-
SHA512
8e69d5e07614b498e3ddc2bb4ce79b734dd215e75dfa72dabb6e138f2e50824975e7af86302d15c988022217968cbb45937d663612640d0025fa25b44570a364
-
SSDEEP
1572864:yXbfmaPS2DP0IVADQh/BX6xJWyoszrxhh/R88bfax/XOc:+bfmrq/hpqLoszrFR12xX7
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00466.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Extracted
darkcomet
pc
host12365485454.ddns.net:1604
192.168.0.125:1604
DC_MUTEX-Q8QDW8F
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
locQi1ySlvoS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
micro update
Extracted
nullmixer
http://motiwa.xyz/
Extracted
redline
Cana
176.111.174.254:56328
Extracted
redline
DomAni2
flestriche.xyz:80
Extracted
C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\packages\vcRuntimeMinimum_x86\HowToRestoreMyFiles.txt
Extracted
\Device\HarddiskVolume1\Read_Me!_.txt
Targets
-
-
Target
RNSM00466.7z
-
Size
83.9MB
-
MD5
add9b95cfef4f7b5e89946205f16a572
-
SHA1
077667fb23e0b48936714b8d4a54f162203a934a
-
SHA256
133c0ba06c58e2b694c42135545d7554b3d6e37ad752bd6a3fa97b5577cd6033
-
SHA512
8e69d5e07614b498e3ddc2bb4ce79b734dd215e75dfa72dabb6e138f2e50824975e7af86302d15c988022217968cbb45937d663612640d0025fa25b44570a364
-
SSDEEP
1572864:yXbfmaPS2DP0IVADQh/BX6xJWyoszrxhh/R88bfax/XOc:+bfmrq/hpqLoszrFR12xX7
-
Detect LockFile payload
-
Detect MafiaWare666 ransomware
-
GandCrab payload
-
LockFile
LockFile is a new ransomware that emerged in July 2021 with ProxyShell vulnerabilties.
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Disables RegEdit via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Program crash
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
8Discovery
Peripheral Device Discovery
2Process Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1