General

  • Target

    RNSM00353.7z

  • Size

    4.6MB

  • Sample

    241109-yew7lstlgn

  • MD5

    11a6f02939993e87233b73ef7f8cacd6

  • SHA1

    62d22c30443c795c798c1e301deff3e015cf9e21

  • SHA256

    e2c178ff3ce63e5df67787e3ad1c2b4a0c080482b4b29cf590c3e75c7910c0be

  • SHA512

    cbd124a0e1764fe2a2155acadc635acdd3982fd61f458360868cc47d82b04239d85c89b2dd84fa59c7d616e81831bb038fe736361f70b88482edc6a7bb490705

  • SSDEEP

    98304:73Ef+MXIc+0j4PHVFMOi57d7XYMmIjJJv6DGGpt:rEIgj4Vi5p0MmeJh6DG8

Malware Config

Extracted

Family

brbbot

C2

brb.3dtuts.by

Targets

    • Target

      RNSM00353.7z

    • Size

      4.6MB

    • MD5

      11a6f02939993e87233b73ef7f8cacd6

    • SHA1

      62d22c30443c795c798c1e301deff3e015cf9e21

    • SHA256

      e2c178ff3ce63e5df67787e3ad1c2b4a0c080482b4b29cf590c3e75c7910c0be

    • SHA512

      cbd124a0e1764fe2a2155acadc635acdd3982fd61f458360868cc47d82b04239d85c89b2dd84fa59c7d616e81831bb038fe736361f70b88482edc6a7bb490705

    • SSDEEP

      98304:73Ef+MXIc+0j4PHVFMOi57d7XYMmIjJJv6DGGpt:rEIgj4Vi5p0MmeJh6DG8

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Adwind family

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • BrbBot

      BrbBot is first seen in early 2022 and it is written in C++.

    • Brbbot family

    • Class file contains resources related to AdWind

    • GandCrab payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Imminent family

    • Modifies Windows Defender Real-time Protection settings

    • Modifies firewall policy service

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Troldesh family

    • Troldesh, Shade, Encoder.858

      Troldesh is a ransomware spread by malspam.

    • Windows security bypass

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks