General
-
Target
RNSM00442.7z
-
Size
88.1MB
-
Sample
241024-xey6ja1dng
-
MD5
4b38c460395d00fabeefa4f8ed666f42
-
SHA1
267f3cec8cb2d370e66b2e38a20e795dd3ac136b
-
SHA256
637818d66515e2c06402e23fe770314f0776dfa9816c321722d01d36c84eb63e
-
SHA512
d0e9d0925abfb8a58416ae0764bbce1e0f1cd272e726b7b2bec1db72274a5e9df664e86cb895415c10437c7269831ec7dfe75274b0026431b898d09244dc31c2
-
SSDEEP
1572864:hodAPPOiNbJytutfKZ6sl/r+iFESVxyFhUCYZxSGzlnrleOjLQ5w0N5L0RA4vz:hTWiNbJA4PAr+i4AfSGxBeOjL8L0Tz
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00442.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
njrat
0.7d
HacKed
corona82.ddns.net:2300
5d6783849b66a004f71db5ea93e302ae
-
reg_key
5d6783849b66a004f71db5ea93e302ae
-
splitter
|'|'|
Extracted
C:\Users\Admin\Desktop\fl6OA_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\fl6OA_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Music\fl6OA_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\files\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.xyz/
Extracted
redline
@andomian
45.81.227.32:22625
Extracted
redline
@vtreqq
45.81.227.32:22625
Extracted
C:\Apache\GATE\GATE\GATE\GATE\GATE\GATE\GATE\GATE\GATE\!!FAQ for Decryption!!.txt
http://cuba4mp6ximo2zlo.onion/
Targets
-
-
Target
RNSM00442.7z
-
Size
88.1MB
-
MD5
4b38c460395d00fabeefa4f8ed666f42
-
SHA1
267f3cec8cb2d370e66b2e38a20e795dd3ac136b
-
SHA256
637818d66515e2c06402e23fe770314f0776dfa9816c321722d01d36c84eb63e
-
SHA512
d0e9d0925abfb8a58416ae0764bbce1e0f1cd272e726b7b2bec1db72274a5e9df664e86cb895415c10437c7269831ec7dfe75274b0026431b898d09244dc31c2
-
SSDEEP
1572864:hodAPPOiNbJytutfKZ6sl/r+iFESVxyFhUCYZxSGzlnrleOjLQ5w0N5L0RA4vz:hTWiNbJA4PAr+i4AfSGxBeOjL8L0Tz
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon payload
-
GandCrab payload
-
Modifies visiblity of hidden/system files in Explorer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Vanilla Rat payload
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3Clear Persistence
1File Deletion
2Modify Registry
3