General
-
Target
RNSM00353.7z
-
Size
4.6MB
-
Sample
241109-yew7lstlgn
-
MD5
11a6f02939993e87233b73ef7f8cacd6
-
SHA1
62d22c30443c795c798c1e301deff3e015cf9e21
-
SHA256
e2c178ff3ce63e5df67787e3ad1c2b4a0c080482b4b29cf590c3e75c7910c0be
-
SHA512
cbd124a0e1764fe2a2155acadc635acdd3982fd61f458360868cc47d82b04239d85c89b2dd84fa59c7d616e81831bb038fe736361f70b88482edc6a7bb490705
-
SSDEEP
98304:73Ef+MXIc+0j4PHVFMOi57d7XYMmIjJJv6DGGpt:rEIgj4Vi5p0MmeJh6DG8
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00353.7z
Resource
win7-20240903-en
Malware Config
Extracted
brbbot
brb.3dtuts.by
Targets
-
-
Target
RNSM00353.7z
-
Size
4.6MB
-
MD5
11a6f02939993e87233b73ef7f8cacd6
-
SHA1
62d22c30443c795c798c1e301deff3e015cf9e21
-
SHA256
e2c178ff3ce63e5df67787e3ad1c2b4a0c080482b4b29cf590c3e75c7910c0be
-
SHA512
cbd124a0e1764fe2a2155acadc635acdd3982fd61f458360868cc47d82b04239d85c89b2dd84fa59c7d616e81831bb038fe736361f70b88482edc6a7bb490705
-
SSDEEP
98304:73Ef+MXIc+0j4PHVFMOi57d7XYMmIjJJv6DGGpt:rEIgj4Vi5p0MmeJh6DG8
-
Adwind family
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Brbbot family
-
Class file contains resources related to AdWind
-
GandCrab payload
-
Gandcrab family
-
Imminent family
-
Modifies firewall policy service
-
Remcos family
-
Troldesh family
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
5Disable or Modify System Firewall
2Disable or Modify Tools
3Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2