General
-
Target
DoomRatBuilder.zip
-
Size
13.0MB
-
Sample
241103-r19w9syrdr
-
MD5
3c276bca2ec2bd57e202054f656cf9f1
-
SHA1
286d6f2cfe420316d334dd6b3fe72ee722baad6f
-
SHA256
74cfc057cbfeb17b52c02abd1628a732f88509ae3bdcf43acd2621fc89e64bce
-
SHA512
1fafba85fcfe24433d0540c92fb3d8569b5fe70e9ef8d007bb0b34d793fe0cffe6b1b546fdbf46d0a085e3a7d2b91f3567128dff2494a24c1d895249d9d62d60
-
SSDEEP
393216:y2Ms95kubaxzRJ80LBRszNZ88u3RNu+xTmXleTi5:yhsPba5RDtRsRZ88ERPUXh
Behavioral task
behavioral1
Sample
DoomRatBuilder.zip
Resource
win11-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
up-max.ru - Port:
21 - Username:
vipgo118 - Password:
GIWrYVC3
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://mazafaka.ru/index.php
http://asechka.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://lovingod.host.sk/index.php
http://mazafaka.ru/index.htm
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Extracted
cobaltstrike
6
http://39.106.152.236:11443/load
-
access_type
512
-
beacon_type
2048
-
host
39.106.152.236,/load
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
11443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCx7NPIg4kgoGnsbOt1BZs0uWn63zH45yzOdUTDiX3mOdDzyAD8sDKDBl/oBmlk3v4bgM8NypUg467E3RvM5qLZhz9mY+lN79CLjAQCO/drohSZp8WyhooaC5pWDoCuMR/fgWgvNNuIdqfFHL+dlDmMM6yKd3w1QswKkbpNuZjV/wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENIN)
-
watermark
6
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
cybergate
2.6
habbo
the-diego.no-ip.org:200
the-diego.no-ip.org:81
the-diego.no-ip.org:82
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Extracted
koiloader
http://195.54.160.202/gowan.php
-
payload_url
https://www.luciaricciardi.com/wp-content/uploads/2018/12
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:5555
127.0.0.1:4816
127.0.0.1:5432
127.0.0.1:46510
sb7fmp5.localto.net:4816:8848
sb7fmp5.localto.net:4816:5555
sb7fmp5.localto.net:4816:4816
sb7fmp5.localto.net:4816:5432
sb7fmp5.localto.net:4816:46510
computers-medications.gl.at.ply.gg:8848
computers-medications.gl.at.ply.gg:5555
computers-medications.gl.at.ply.gg:4816
computers-medications.gl.at.ply.gg:5432
computers-medications.gl.at.ply.gg:46510
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_file
chrome.exe
-
install_folder
%AppData%
Targets
-
-
Target
DoomRatBuilder.zip
-
Size
13.0MB
-
MD5
3c276bca2ec2bd57e202054f656cf9f1
-
SHA1
286d6f2cfe420316d334dd6b3fe72ee722baad6f
-
SHA256
74cfc057cbfeb17b52c02abd1628a732f88509ae3bdcf43acd2621fc89e64bce
-
SHA512
1fafba85fcfe24433d0540c92fb3d8569b5fe70e9ef8d007bb0b34d793fe0cffe6b1b546fdbf46d0a085e3a7d2b91f3567128dff2494a24c1d895249d9d62d60
-
SSDEEP
393216:y2Ms95kubaxzRJ80LBRszNZ88u3RNu+xTmXleTi5:yhsPba5RDtRsRZ88ERPUXh
Score10/10asyncratberbewblackmoonblankgrabbercobaltstrikecybergatediscord.gg/scamalertskoiloadermydoomramnitsalityxworm6defaulthabbo anti vm apt group backdoor access banking trojan bootkit malware botnet controller clipper malware crypter data collection upx packeradwarebackdoorbankercollectiondefense_evasiondiscorddiscoveryevasionexecutionloaderpyinstallerratspywarestealerthemidatrojanupxworm-
6bXW8llvSi
SKIBIDI TOILET SKIBIDI TOILET SKIBIDI TOILET!!!!.
-
Asyncrat family
-
Berbew family
-
Blackmoon family
-
Blankgrabber family
-
Cobaltstrike family
-
Cybergate family
-
Detect Blackmoon payload
-
Detect Xworm Payload
-
Detects MyDoom family
-
Discord.gg/Scamalerts family
-
Koiloader family
-
Mydoom family
-
Ramnit family
-
Sality family
-
Xworm family
-
blankgrabber
Blankgrabber is an infostealer written in Python and packaged with Pyinstaller.
-
Async RAT payload
-
Detects KoiLoader payload
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Discovery
Browser Information Discovery
1Network Share Discovery
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
3System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1