General
-
Target
RNSM00317.7z
-
Size
4.5MB
-
Sample
241112-xvp8kaxray
-
MD5
1f0a3c0d633cffdec981a36b868af1ab
-
SHA1
d04f70e113bdfe863c2658d6ad4c1ddf5412ecfa
-
SHA256
e4517fe3680c52565d854d2242d9ba7eddf25a80509eed18525ec428364761b9
-
SHA512
156b8bade296be4f6653f6f13bac1ddc0b5280c0092b09743ad5d4a460060b8e4cf198fcb5fe1e77af1962f46f8ea7caf1afb3fdc63fb9700027d6a004d50710
-
SSDEEP
98304:J0V1RCjxkSb5i7yKRQc/W3yT8m6rpGDx3pz0Z9qOcU0SzlqgMAVEStZ0:SEtkSc7h/GsNxM0gMXStZ0
Static task
static1
Malware Config
Extracted
formbook
3.8
da
citybudgettree.tech
anamikabaruah.com
woorobo.com
physics.center
formerworld.com
mckpr.info
rexo17.download
butthole.online
999-dvd.com
mykinwallet.com
energiin.info
stoneboris.win
tlbfp.loan
kinder-laender-zukunft.com
alinebaca-lep.com
veretium.com
villa17home.com
6m1six.loan
dichvupccc.com
affiliatelecture.com
britegrow.com
xiaolinanmeilu.com
f46dbbx-cytizzs.com
taffy.store
automationservicefinland.com
nnmps8.com
sweetsilks.com
unifiedexpress.net
haibinxiaoxiaole.net
spfsb.info
texasweatherchaser.com
aighdev.com
aerobauxite.com
myokavango.com
hellas-yachting.net
l44x4f.info
mycandyoffice.com
steurer.domains
angde.net
sechzig-today.com
vsvgr.com
custodyomaha.com
musclepotentiation.com
xn--fiqs8sdogum4a.ink
linayjuanpablo.com
wavestarfilms.com
eggslaidbytigers.net
biz2prime.com
mervinolkkari.com
quicklyclose.com
apexaspiredmarketing.com
baypointlodge.com
axeandcircuit.com
wyattmaher.com
mikeandrachwed.com
littleflowerfactory.com
mateshelp.com
eranhalperingenomics.com
qjhwzs.com
dayofglory.com
thebigandfreeupdating.download
delightfulmugs.com
ccdwo.info
universiteitstudies.online
litthlewhiteflowers.info
Extracted
C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
C:\Program Files\Java\jdk1.7.0_80\jre\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
C:\Program Files\VideoLAN\VLC\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
C:\Program Files\VideoLAN\VLC\plugins\access\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\!HELP_YOUR_FILES.HTML
class='style5'>[email protected]</span>
http-equiv='Content-Type
Extracted
xtremerat
enrichosie.sytes.net
Extracted
lokibot
http://molinolatebaida.com/basic-jquery-slider-8ffe118/js/lib/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
RNSM00317.7z
-
Size
4.5MB
-
MD5
1f0a3c0d633cffdec981a36b868af1ab
-
SHA1
d04f70e113bdfe863c2658d6ad4c1ddf5412ecfa
-
SHA256
e4517fe3680c52565d854d2242d9ba7eddf25a80509eed18525ec428364761b9
-
SHA512
156b8bade296be4f6653f6f13bac1ddc0b5280c0092b09743ad5d4a460060b8e4cf198fcb5fe1e77af1962f46f8ea7caf1afb3fdc63fb9700027d6a004d50710
-
SSDEEP
98304:J0V1RCjxkSb5i7yKRQc/W3yT8m6rpGDx3pz0Z9qOcU0SzlqgMAVEStZ0:SEtkSc7h/GsNxM0gMXStZ0
-
Adwind family
-
Class file contains resources related to AdWind
-
Detect XtremeRAT payload
-
Formbook family
-
GandCrab payload
-
Gandcrab family
-
Lokibot family
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Formbook payload
-
Renames multiple (786) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1