General

  • Target

    RNSM00390.7z

  • Size

    22.2MB

  • Sample

    241101-27dshsvlht

  • MD5

    be01234d4d2719248cc7bfd2db5399f8

  • SHA1

    30c4a2a41aa45b23d8ea01e547c0e7287b9ba256

  • SHA256

    eaf4667ec6da80010831e61c49a8035dbf36a94ee99297848d3e673d15de52e5

  • SHA512

    71d1fae415f5cb1bedeab41d51f5f8d116f1fa692beaf841e729050482b36647b425a8ac6b0e5ff8d3ad3dbe4d34d8133e06188281be416c9213253d35eaac57

  • SSDEEP

    393216:bKwuR608VMFPJzP7sJSUgNyLNDcqt6/FGuEro0Y912PnhKMZTcc:N0D7sNBNuFfEM4PPoc

Malware Config

Extracted

Family

azorult

C2

http://185.130.215.95/ik0diey/index.php

Extracted

Family

warzonerat

C2

hive01.duckdns.org:8584

Targets

    • Target

      RNSM00390.7z

    • Size

      22.2MB

    • MD5

      be01234d4d2719248cc7bfd2db5399f8

    • SHA1

      30c4a2a41aa45b23d8ea01e547c0e7287b9ba256

    • SHA256

      eaf4667ec6da80010831e61c49a8035dbf36a94ee99297848d3e673d15de52e5

    • SHA512

      71d1fae415f5cb1bedeab41d51f5f8d116f1fa692beaf841e729050482b36647b425a8ac6b0e5ff8d3ad3dbe4d34d8133e06188281be416c9213253d35eaac57

    • SSDEEP

      393216:bKwuR608VMFPJzP7sJSUgNyLNDcqt6/FGuEro0Y912PnhKMZTcc:N0D7sNBNuFfEM4PPoc

    • Avaddon

      Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.

    • Avaddon family

    • Avaddon payload

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • GandCrab payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • HiveRAT

      HiveRAT is an improved version of FirebirdRAT with various capabilities.

    • Hiverat family

    • UAC bypass

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • HiveRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Warzone RAT payload

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks