General

  • Target

    2737e2cab1e399c563fe0557683234fd_JaffaCakes118

  • Size

    3.9MB

  • Sample

    241008-3qy8kazbkq

  • MD5

    2737e2cab1e399c563fe0557683234fd

  • SHA1

    a78fdf21a20d386622a448909c4c3d8a527e3102

  • SHA256

    f7f5898bbed2b677a52a031071110b8aebb4b3eba2669703f6dd60e6953dc2a2

  • SHA512

    3e58d11e6a87bb5f52e674b998672e9d3d8b165275e8818733a2da1043279a9c4109aa7ad51bb74de9984d360e7f277f92653f50e2088c66cb0b6552901a6dff

  • SSDEEP

    98304:yFdkFKkhdtRHWG5yuIEjf9kDQQXItcd0u3uOZKGo:yFRkHLJhBFoXItcd008

Malware Config

Extracted

Family

nullmixer

C2

http://marisana.xyz/

Extracted

Family

redline

Botnet

Build1

C2

45.142.213.135:30058

Targets

    • Target

      2737e2cab1e399c563fe0557683234fd_JaffaCakes118

    • Size

      3.9MB

    • MD5

      2737e2cab1e399c563fe0557683234fd

    • SHA1

      a78fdf21a20d386622a448909c4c3d8a527e3102

    • SHA256

      f7f5898bbed2b677a52a031071110b8aebb4b3eba2669703f6dd60e6953dc2a2

    • SHA512

      3e58d11e6a87bb5f52e674b998672e9d3d8b165275e8818733a2da1043279a9c4109aa7ad51bb74de9984d360e7f277f92653f50e2088c66cb0b6552901a6dff

    • SSDEEP

      98304:yFdkFKkhdtRHWG5yuIEjf9kDQQXItcd0u3uOZKGo:yFRkHLJhBFoXItcd008

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      setup_installer.exe

    • Size

      3.9MB

    • MD5

      4045a563b4f4df19f553ded02cacea1b

    • SHA1

      1f0c4a72aafda1ed1d6755f0faca171245f1208b

    • SHA256

      b532bd57b6ebf98b3e92da44b8b569bda286a359e7ee4473d26ab46842227141

    • SHA512

      b7e2ecab78e3f5effd5ed533586d1ee17a96e70afeaea889fddad974f0ed948f9aed2ffb27596c871e48086544ed4f2ac311957b2f0069d18c546e6a600e723c

    • SSDEEP

      98304:xxCvLUBsgjamy9MCDP/mS2NYSw1REPJti7T+o3:xaLUCgjaHnDHmSWVw1EJ8TP

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Vidar Stealer

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks