General

  • Target

    281c7ba6787d047d9eff840c79c19816_JaffaCakes118

  • Size

    4.0MB

  • Sample

    241009-bczhmawekn

  • MD5

    281c7ba6787d047d9eff840c79c19816

  • SHA1

    1b41a63ce815c055038824ecd67fb606a2210fc7

  • SHA256

    aa9b8b79b9b4e0478e85c4ae5b08c15aadea45cac7617de2c298070fd781748e

  • SHA512

    8ba03a346dc3246abd8af0768f20c71cf875de6554dfa961c17de373fe28f6252a3c263238760148a208d830e53fb399b8bafceaa2f678c94b891a08b517dfc4

  • SSDEEP

    98304:JH4fPHwHNLfwCFx7zWBBWUhT0BRQf6608yFLBiMt/cwC:JYnQtz/WBcEIKVML1qwC

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

redline

Botnet

OLKani

C2

ataninamei.xyz:80

Targets

    • Target

      281c7ba6787d047d9eff840c79c19816_JaffaCakes118

    • Size

      4.0MB

    • MD5

      281c7ba6787d047d9eff840c79c19816

    • SHA1

      1b41a63ce815c055038824ecd67fb606a2210fc7

    • SHA256

      aa9b8b79b9b4e0478e85c4ae5b08c15aadea45cac7617de2c298070fd781748e

    • SHA512

      8ba03a346dc3246abd8af0768f20c71cf875de6554dfa961c17de373fe28f6252a3c263238760148a208d830e53fb399b8bafceaa2f678c94b891a08b517dfc4

    • SSDEEP

      98304:JH4fPHwHNLfwCFx7zWBBWUhT0BRQf6608yFLBiMt/cwC:JYnQtz/WBcEIKVML1qwC

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Vidar Stealer

    • XMRig Miner payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      setup_installer.exe

    • Size

      4.0MB

    • MD5

      944d41f7f2edf92ba7308f0cc063e0e6

    • SHA1

      5fa4e1b3ada8568e0e9836ca42f7b37891031833

    • SHA256

      e095acc932243514d360b9ee1e5d45889eb5f22a2b4ab3c30ce113b1ea30613d

    • SHA512

      d44e0219079f6ce6e81d334ea6d9a86088e57ae69ce032446c760d3015db46281394333730d5c06acd1763be62a227717ddb5362af66e774f05967ab8990c2c2

    • SSDEEP

      98304:xBtlNXWaP+FQGE/LHlrJ/Dm1rZ1SCvLUBsKnNw:xBzNXWacQGQl0pZ1jLUCKnNw

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Vidar Stealer

    • XMRig Miner payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks