General
-
Target
RNSM00412.7z
-
Size
14.5MB
-
Sample
241028-vf595a1rel
-
MD5
8ecd8c9e7d8141401a10ed5cd5b066a9
-
SHA1
15d22e6233335814edaaa15189a24203ebac6090
-
SHA256
6e611394ed96ae4daff1cbec71ad8c01db72f34aa7f284f2711c008ea2718c32
-
SHA512
99a5b3e99c97a04f7041f458cacf4b837dab0dde05474d37ca28055f6c8521dbb009fcd149e48ed0648ec11ec43d210ec414c4e212fe904a21ba5c4f031b287a
-
SSDEEP
393216:nqXv1gM4dDChl4/mLCDkFaUqGlMZivm5Y6K:qfuylJCDeaLOUu
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00412.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.3.0.0
diapo
martinou.ddns.net:4782
192.168.1.58:4782
QSR_MUTEX_ZioP8Y2W1XRiJhpyGu
-
encryption_key
boWo6nW09VJiDKtOxlIE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Extracted
C:\Program Files (x86)\readme.txt
conti
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.best
Extracted
C:\Program Files\7-Zip\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Targets
-
-
Target
RNSM00412.7z
-
Size
14.5MB
-
MD5
8ecd8c9e7d8141401a10ed5cd5b066a9
-
SHA1
15d22e6233335814edaaa15189a24203ebac6090
-
SHA256
6e611394ed96ae4daff1cbec71ad8c01db72f34aa7f284f2711c008ea2718c32
-
SHA512
99a5b3e99c97a04f7041f458cacf4b837dab0dde05474d37ca28055f6c8521dbb009fcd149e48ed0648ec11ec43d210ec414c4e212fe904a21ba5c4f031b287a
-
SSDEEP
393216:nqXv1gM4dDChl4/mLCDkFaUqGlMZivm5Y6K:qfuylJCDeaLOUu
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Buran family
-
Conti family
-
Detects Zeppelin payload
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Zeppelin family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates VirtualBox DLL files
-
Looks for VirtualBox drivers on disk
-
ModiLoader First Stage
-
Renames multiple (2068) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Looks for VMWare drivers on disk
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Deobfuscate/Decode Files or Information
1Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1File and Directory Discovery
3Peripheral Device Discovery
2Query Registry
4Remote System Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3