General

  • Target

    d81801103db8099772e85deae68b43aaa7e894366ab55b819dc1f89d54e9823d

  • Size

    5.7MB

  • Sample

    241106-s364tsvpek

  • MD5

    7e7e4c62d44e8f8280474a1b852eef49

  • SHA1

    a9781422b5ff52ed54907821d506a70e650b1f72

  • SHA256

    d81801103db8099772e85deae68b43aaa7e894366ab55b819dc1f89d54e9823d

  • SHA512

    326d12f48aefbcff3e2ae2fbb3b6591e932e4650e8d20a0fe62dea49c1b5c529387b70b858e5c44d70ce96f28d52d07eea0f47a4d464a5b5b5845c95c3060443

  • SSDEEP

    98304:Xh9UDVemKJcHCMlHhXYMS0xFMrA5g7PUwnJMvgT25tYZ6R+dCTZIYP6+2pp:XTWVebJeCMZaMV0V7PUkJ25VR+dCTaYw

Malware Config

Extracted

Family

nullmixer

C2

http://razino.xyz/

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

redline

Botnet

Ani

C2

detuyaluro.xyz:80

Targets

    • Target

      main_setup_x86x64.exe

    • Size

      5.7MB

    • MD5

      d241c70e1db8676e48c9c02937b2a589

    • SHA1

      45f2b455c72040798fd92801e28dd5c154be8e8b

    • SHA256

      36a7bd10bbfbb3998773c4822e1813b4f4bfb33e65a008241c35116e19dae52c

    • SHA512

      5b376da38f0361a672ac3ac4c1fe0ec66ed3642fb591ade7fe4f400f7ad3c1affe440a4b243d036e4e58ed131df43376ff5e2b6c1b733a43cf4e68dd752f7072

    • SSDEEP

      98304:JEp59qaoFjCCtIJ89NG67vrPqTxSMcEeeZ6eDoPKXLcj:JEpKaoRw89kOrSTWLeDNXI

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Modifies Windows Defender Real-time Protection settings

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      setup_installer.exe

    • Size

      5.6MB

    • MD5

      0de8943eeed1e068cfb1f8174eb4777b

    • SHA1

      8c9616d1c945fbddfe2093f2bc50408f53e59c19

    • SHA256

      8869188aa10bb2230b54eeaf867d45700c10f5eb2d2cf20139187cac10372231

    • SHA512

      637a07bc552cd0b30b820c32c0ebdff3451b25b8b83bfd65d5e924f4b9ba20ca75af48d5dbe5f16344128dc915d5fd3efe010d0270baf98b044570624444cd1f

    • SSDEEP

      98304:xI9eBSJ4cb13SCpPnmb+IVmK8Cnc1436M8qj8skXg1IPL+29CvLUBsK80:xI9e5cb15tnmCIgKHnc16aq1Kg1IPLzd

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Modifies Windows Defender Real-time Protection settings

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks