General

  • Target

    3ca30a9870de93b1929ce9c02f647c1791acf70b6848f1c4f795b20cf25c1e45

  • Size

    4.8MB

  • Sample

    241104-xrq1paxrcm

  • MD5

    a926e55a75896aa4c261156bf6609832

  • SHA1

    5ace1ef3669e61a0b7ef8d5670f2f1d82173f29a

  • SHA256

    3ca30a9870de93b1929ce9c02f647c1791acf70b6848f1c4f795b20cf25c1e45

  • SHA512

    ab8fb2317f953004322e329296db5e8cc28d468d67f0361811e8826802ac4de2ef96053f3c3ac01c0e5ec1581d18fb28c2cb86fb02177a27733a1cbe94144c29

  • SSDEEP

    98304:XjVMCkZR9+6CRFSXmDYGwqOzj0lzy1Bmy2Q/IhIRIY1Ev69RZzVTWdiH:GwjSYBYj09y/20mY17RZzV7

Malware Config

Extracted

Family

nullmixer

C2

http://sornx.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Targets

    • Target

      setup_x86_x64_install.exe

    • Size

      4.8MB

    • MD5

      af731b30910bac47cdd0974c662a490c

    • SHA1

      243d8250836f5c3f14c6ef41a2c627728ebde372

    • SHA256

      6df17c7749ef2051fe3e97d23958e277a4febcf48c0179a3ae2fff1b4038640f

    • SHA512

      3ff71df7b4bf790e5598ae5e2bacdb325b6458c1a7f7b97ed585279edf96890b1d97394a7618878448e7621cd068f344608d418181ad719bfa0922ff7a9ecaab

    • SSDEEP

      98304:yWN+wY/DEU5lsIopxgVcEn5tbb5CggBGyslZMwr4+Kc36gBo3rCWAb0WPIoR66L:yPwsDqpxgBn5t/4KXlZD4PGKhsJPIoEy

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Cryptbot family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      setup_installer.exe

    • Size

      4.8MB

    • MD5

      ec02f21e9609989b9dc71c981be1b38d

    • SHA1

      b06e15ef538626113b9a5cfbe70cb31480f2ca65

    • SHA256

      ffb56fbf4fcddd75123912dc66dab62c57bb790bb3f66fbff5f247760755fd06

    • SHA512

      20d8b49e3b770c92d084b319c6c1f0e4e643b42f0e9cb8b5d117344abce63607b30cbcdfb391ce7a82cf03aa0f4c20c419129d5394ecea4f40ed495bd3dbbd46

    • SSDEEP

      98304:xyCvLUBsgTFOLElweJs9kAo4K25044DU6GxctGSswIm5W8Nneh:xDLUCgROol6kU0TGW3Leh

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Cryptbot family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks