General
-
Target
RNSM00309.7z
-
Size
2.2MB
-
Sample
241113-vy5rbazjfj
-
MD5
4e649bb49bbb535557a97f987259c701
-
SHA1
f705f30ce7b16a957e88f24a7fe401fc489a07ef
-
SHA256
1600aa05440a0e8020f0ac6624e9eb177b2c76b0fbdb8baff60fce1e5514fe77
-
SHA512
7a4ca45e7f936fa43d5b69d31358bc105c1cf7f9fe9b404a83f36cdce940b6a18c16f005e06624abf4ebd031bf7942e23e46dbb8e2617eda47f250faf41c79ca
-
SSDEEP
49152:pEqkI1iXTIV2Ah0RwzLoKJnD3kg2/S+sMqi0jeAjc1MTiKqbwy:pZiXTiYKtD2S+sMlhA9cbj
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00309.7z
Resource
win7-20240903-en
Malware Config
Extracted
netwire
37.233.101.73:8888
213.152.162.104:8747
213.152.162.170:8747
213.152.162.109:8747
213.152.162.89:8747
109.232.227.138:8747
109.232.227.133:8747
213.152.161.211:8747
213.152.162.94:8747
213.152.161.35:8747
213.152.180.5:8747
-
activex_autorun
true
-
activex_key
{II4160M1-EM5E-6FAH-8P84-A45Y2F264V3P}
-
copy_executable
true
-
delete_original
true
-
host_id
02.12
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
sIujulKF
-
offline_keylogger
true
-
password
DAWAJkurwoKASEniePIERDOL
-
registry_autorun
true
-
startup_name
system
-
use_mutex
true
Extracted
lokibot
http://sariraatjgaye.com/dew/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
remcos
1.7 Pro
Host
173.212.238.224:4444
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_mfmmvpnarpquguk
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RNSM00309.7z
-
Size
2.2MB
-
MD5
4e649bb49bbb535557a97f987259c701
-
SHA1
f705f30ce7b16a957e88f24a7fe401fc489a07ef
-
SHA256
1600aa05440a0e8020f0ac6624e9eb177b2c76b0fbdb8baff60fce1e5514fe77
-
SHA512
7a4ca45e7f936fa43d5b69d31358bc105c1cf7f9fe9b404a83f36cdce940b6a18c16f005e06624abf4ebd031bf7942e23e46dbb8e2617eda47f250faf41c79ca
-
SSDEEP
49152:pEqkI1iXTIV2Ah0RwzLoKJnD3kg2/S+sMqi0jeAjc1MTiKqbwy:pZiXTiYKtD2S+sMlhA9cbj
-
Lokibot family
-
NetWire RAT payload
-
Netwire family
-
Remcos family
-
Contacts a large (7712) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1