General
-
Target
RNSM00457.7z
-
Size
94.2MB
-
Sample
241011-ntp2qszgja
-
MD5
0c9b6bbe2d9d8bccd81434f178293a02
-
SHA1
4e76101a350d50677b5c3eff1f2cdc06b8a059f6
-
SHA256
fe681686e68278cbd393354a7f3a7a044e25cf99d8e093e0ed9342ca21423f6e
-
SHA512
01cbf237680737c1b44c56390cc9ae40ec2d5f14815dc9fea2d5cd793c229d3670306102376d37b9e46ec9d19940a4eb5bf3e65c221ebf96d95c74c8d0d2978b
-
SSDEEP
1572864:0hX+BE1eArX8iIH80O6XBipwQRqaJFTZyB/l5xLE+kLvNqyKF1+B6wONgqCGUzSc:0hX+C3X8iLoRfillyB/DNo6FYB6wOuO+
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00457.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Extracted
C:\Users\Admin\GET_YOUR_FILES_BACK.txt
avoslocker
http://avos2fuj6olp6x36.onion
http://avos53nnmi4u6amh.onion/
Extracted
metasploit
windows/single_exec
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Extracted
redline
@zveryga99872
152.228.150.198:11188
Targets
-
-
Target
RNSM00457.7z
-
Size
94.2MB
-
MD5
0c9b6bbe2d9d8bccd81434f178293a02
-
SHA1
4e76101a350d50677b5c3eff1f2cdc06b8a059f6
-
SHA256
fe681686e68278cbd393354a7f3a7a044e25cf99d8e093e0ed9342ca21423f6e
-
SHA512
01cbf237680737c1b44c56390cc9ae40ec2d5f14815dc9fea2d5cd793c229d3670306102376d37b9e46ec9d19940a4eb5bf3e65c221ebf96d95c74c8d0d2978b
-
SSDEEP
1572864:0hX+BE1eArX8iIH80O6XBipwQRqaJFTZyB/l5xLE+kLvNqyKF1+B6wONgqCGUzSc:0hX+C3X8iLoRfillyB/DNo6FYB6wOuO+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Detect MafiaWare666 ransomware
-
Glupteba payload
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
StormKitty payload
-
AgentTesla payload
-
Core1 .NET packer
Detects packer/loader used by .NET malware.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
OnlyLogger payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Modifies file permissions
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
1