General

  • Target

    44ac6fc2f8d02857f9d7a7bfde1e2376_JaffaCakes118

  • Size

    3.9MB

  • Sample

    241014-3ajsyavgmm

  • MD5

    44ac6fc2f8d02857f9d7a7bfde1e2376

  • SHA1

    0e3c85f03fd36cc4001fb68996b53ff8afb17f7e

  • SHA256

    bae14391cbc9ddb999947b70f3975a7309f73d422a02aaa13ae9100baaa0652c

  • SHA512

    585a915f8669d2303eca95729ec062dbe08907c33e5685f68a0fa563d3ba03f0754b82982c28e74a1f586d5c96872cb1a0c11fb30eec95c3263fcf058ec2cca8

  • SSDEEP

    98304:yRRSck04HegEY+uTckcooqU/q6DvkT2WT7Xz4OwQ:yucwegEuTckXCu9fMOT

Malware Config

Extracted

Family

nullmixer

C2

http://marisana.xyz/

Extracted

Family

redline

Botnet

Build1

C2

45.142.213.135:30058

Targets

    • Target

      44ac6fc2f8d02857f9d7a7bfde1e2376_JaffaCakes118

    • Size

      3.9MB

    • MD5

      44ac6fc2f8d02857f9d7a7bfde1e2376

    • SHA1

      0e3c85f03fd36cc4001fb68996b53ff8afb17f7e

    • SHA256

      bae14391cbc9ddb999947b70f3975a7309f73d422a02aaa13ae9100baaa0652c

    • SHA512

      585a915f8669d2303eca95729ec062dbe08907c33e5685f68a0fa563d3ba03f0754b82982c28e74a1f586d5c96872cb1a0c11fb30eec95c3263fcf058ec2cca8

    • SSDEEP

      98304:yRRSck04HegEY+uTckcooqU/q6DvkT2WT7Xz4OwQ:yucwegEuTckXCu9fMOT

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Vidar Stealer

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      setup_installer.exe

    • Size

      3.9MB

    • MD5

      6c0941d0a99727dd410bc412f97f711a

    • SHA1

      864007f88990b2ca0fe02d682e141db8de5c1dad

    • SHA256

      d1e755eeb204eb15b5038389bb6f04db10a7ca91834a4507efb03f60f5997572

    • SHA512

      1d794f8eacf9d37f4a3dfc3a9a514398799de7b399849938bd43c012b32f08ebbd2d1a3d45988a4380614a7ece6a6d62081b194ae7d34b41b644eb14076ff760

    • SSDEEP

      98304:xGCvLUBsgnsKWBq1Eg903Rj9pM0j3+17Nq6ac/roSFG:xvLUCgnFFCgiRj9pX3+17Nq6acTo1

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks