General

  • Target

    RNSM00322.7z

  • Size

    15.7MB

  • Sample

    241112-w43dtaydkq

  • MD5

    2293047e776b530106663d27b04759b4

  • SHA1

    1cd5184787cbe42e13c4641e8574e8f656dc7b18

  • SHA256

    0ddb01e5d67d7a3c917ded3e2f285a136bf0ea03fdd966edfd32711148315d2c

  • SHA512

    7894e73903802bc04d9e8e6534153e27448b157033665ed8b61017903e4b9b6a50156546664f1d9585396f3b999f157101dd8448ab71c7d02240752c79af559a

  • SSDEEP

    393216:k09sG7gYyVlIrnnyE0pnq7PQr3vAcA6NwumDXUkpXd8:kDGgYyvhVqrQr3vAc43DXNd8

Malware Config

Extracted

Family

xtremerat

C2

mongtrelgo.hopto.org

Targets

    • Target

      RNSM00322.7z

    • Size

      15.7MB

    • MD5

      2293047e776b530106663d27b04759b4

    • SHA1

      1cd5184787cbe42e13c4641e8574e8f656dc7b18

    • SHA256

      0ddb01e5d67d7a3c917ded3e2f285a136bf0ea03fdd966edfd32711148315d2c

    • SHA512

      7894e73903802bc04d9e8e6534153e27448b157033665ed8b61017903e4b9b6a50156546664f1d9585396f3b999f157101dd8448ab71c7d02240752c79af559a

    • SSDEEP

      393216:k09sG7gYyVlIrnnyE0pnq7PQr3vAcA6NwumDXUkpXd8:kDGgYyvhVqrQr3vAc43DXNd8

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Adwind family

    • Class file contains resources related to AdWind

    • Detect XtremeRAT payload

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Troldesh family

    • Troldesh, Shade, Encoder.858

      Troldesh is a ransomware spread by malspam.

    • UAC bypass

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks