General
-
Target
RNSM00446.7z
-
Size
68.4MB
-
Sample
241015-zwd8ss1elr
-
MD5
3f1f1933521d96cb2a537eb57f0b8f4b
-
SHA1
24b372467e9a2ad7aeac32ddac4aa71f22f3833c
-
SHA256
b964e2c619289523043166d503c2f16b7b350f49533bc72d986adf09377bced0
-
SHA512
251905f5fc6d738a8465ddda9d82cc357f9d2197fa9a7023447145b19587d1b8be56cfc7f0481f879a74bd9a4cd1777c929c90b76740de88bf4a083ca0ff0e82
-
SSDEEP
1572864:WK6vBCJ4ynaQtuzbKsm5v5P04ljYEKR7sttLlxmi3bzvBZVdr:WK6vkfaBm5cCYTsHLlJf/
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00446.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://motiwa.xyz/
Extracted
redline
Ani
yaklalau.xyz:80
Extracted
redline
NewAni
changidwia.xyz:80
Extracted
C:\ProgramData\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.xyz
Extracted
redline
Cana
176.111.174.254:56328
Targets
-
-
Target
RNSM00446.7z
-
Size
68.4MB
-
MD5
3f1f1933521d96cb2a537eb57f0b8f4b
-
SHA1
24b372467e9a2ad7aeac32ddac4aa71f22f3833c
-
SHA256
b964e2c619289523043166d503c2f16b7b350f49533bc72d986adf09377bced0
-
SHA512
251905f5fc6d738a8465ddda9d82cc357f9d2197fa9a7023447145b19587d1b8be56cfc7f0481f879a74bd9a4cd1777c929c90b76740de88bf4a083ca0ff0e82
-
SSDEEP
1572864:WK6vBCJ4ynaQtuzbKsm5v5P04ljYEKR7sttLlxmi3bzvBZVdr:WK6vkfaBm5cCYTsHLlJf/
-
Detect MafiaWare666 ransomware
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Modifies WinLogon for persistence
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Clears Windows event logs
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Renames multiple (153) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1