General

  • Target

    13397a15736988b52fe1634f0188f2252eeac130650a15385852a7d994eb3af9

  • Size

    4.8MB

  • Sample

    241106-wqpwkavhrj

  • MD5

    796cb08e6353afeba19ab33f298960f9

  • SHA1

    98046760a589b39ae194eb54dd9ed8b80e3f95ab

  • SHA256

    13397a15736988b52fe1634f0188f2252eeac130650a15385852a7d994eb3af9

  • SHA512

    a8509bd3cb705341d28512e9c4200a4ca2f1e218c6e89b370ebc627f2ab8088dd022025e5c06189bc2e87dcbe9d7082fdccd642e9ff62932775a0c628b571626

  • SSDEEP

    98304:WYT3fEKrx9Re5Vr7tLj9M3lD1qT70dJMitdT8X+2YbbHIUV/DOTQ5rpLi:DTvEKrx9AVHN9ylDU70d2goUbRpe

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Targets

    • Target

      setup_x86_x64_install.exe

    • Size

      4.8MB

    • MD5

      6dcd8a0c65183e2b3780b4a9f5b2f877

    • SHA1

      53394a3f324a8118aefbe5d987abe687df0219ce

    • SHA256

      03ad89ed671477f0890819c571f70cf954593eb08d0569808d9b14b545bcf526

    • SHA512

      bdb16e82c8e169b64a5d6aa493099736668f96f88553b5ba7d41f641ac360bc4f4e84f311e92ff8c7e9b8f93da0bcce391fdcebc9dd80e1f007e021d959e9f17

    • SSDEEP

      98304:ykDMVEoBsoJcNRJeEGZKHlBm3ch5E/cBiPvUjlTNEWB7szfduug:ycMVXB0RJeFKHDm3cc/c+sBDB7szfde

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Cryptbot family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      setup_installer.exe

    • Size

      4.7MB

    • MD5

      739c9ff1236d3fafaa68d279f1b126b7

    • SHA1

      0d27b4f313bb8d324776fcf067adebd3f9e8c53e

    • SHA256

      36d452657a21c5477f387d83ab923e973a4e3ed8fa9a764741ca75040d725e4d

    • SHA512

      e4c2c086e6f0b8aebe80c4cb484296f8f7de3f59379499d49004be35c9d80f6fab491b49d6ee8c1de4cacdf0979ca135a7811c2a85303fac977ed70691115c5e

    • SSDEEP

      98304:xHCvLUBsgsl0Q4iU4TETmlVZSk4lswhMR25cWu0Yf20t8LFal3Q2/3lCjtl:xkLUCgvQ/l4/PiZ03LLwlBlm

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Cryptbot family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks