General

  • Target

    shark_botnet_c2.zip

  • Size

    6.8MB

  • Sample

    241115-ygvfsstrep

  • MD5

    bf52fb2803cc805f797b2f00ceb4260d

  • SHA1

    6724edfefaaa0ac387d6f7bfae9ad6280eb6908a

  • SHA256

    ba9ada271c0e3bb2c53762c41a19f414811f8b3079e107adbb64edbed4b45b53

  • SHA512

    396880f658cb8b7289332db46b88a89a89dd3613295b5fb6919a1919607438b70054a2909cebf5f9f563485701f3176ecf4de6c7da728d4eba5775bdb06573c6

  • SSDEEP

    196608:wPjxTGiNv++tfZT1dKp+nK6kbQ3sxInFWt:wZNvttfZTiUtkU3scO

Malware Config

Targets

    • Target

      shark_botnet_c2.zip

    • Size

      6.8MB

    • MD5

      bf52fb2803cc805f797b2f00ceb4260d

    • SHA1

      6724edfefaaa0ac387d6f7bfae9ad6280eb6908a

    • SHA256

      ba9ada271c0e3bb2c53762c41a19f414811f8b3079e107adbb64edbed4b45b53

    • SHA512

      396880f658cb8b7289332db46b88a89a89dd3613295b5fb6919a1919607438b70054a2909cebf5f9f563485701f3176ecf4de6c7da728d4eba5775bdb06573c6

    • SSDEEP

      196608:wPjxTGiNv++tfZT1dKp+nK6kbQ3sxInFWt:wZNvttfZTiUtkU3scO

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      WinDivert.dll

    • Size

      15KB

    • MD5

      1b1284100327d972e017f565dbecf80e

    • SHA1

      5b4f0c122a80478973eb6f9cb3bbcaf186295aea

    • SHA256

      9444a6e6b66f13f666f9c60d1935824f61c7256e35a8cf0440e29baa7fbe42c7

    • SHA512

      4ccb9e233a3573f6eded0efa8fa54ed929818394cdf2153623d902c749d37751da6f489354aa50968e53d42d5ce339f6368dedb7858a4ff43a1927b4338954a4

    • SSDEEP

      384:EHGiP0PYf9pHuGvATXlQRNq/EbUKxcneWuDlE:E9MQf90GvQXlQvAEcehD

    Score
    1/10
    • Target

      WinDivert64.sys

    • Size

      37KB

    • MD5

      3bd5ac2e9d96e680f5dbdd183a58c47d

    • SHA1

      83b08cb5e61c7b37bd710ea01196a26fc8f38610

    • SHA256

      208c092fe77f161c5a313b916d73fa7f6d10dd289bab8bb5dfb3d59aacb27f25

    • SHA512

      6cccd7971f423f72f5dbd01a83a2d27bb2bde63c4d1f5e127d77cfa0df85c289a2c3cd95c110ce38b58b9ea9a49aad18ae50f352ac6b21740d0294f771fbcb78

    • SSDEEP

      768:R5VorUqgJs3/KtdrbYiZdNSRUYjbMUYOUaCdHUZ9fdCrYc:vVorUn9cRUuILLd07fdCU

    Score
    1/10
    • Target

      barrier.cpp

    • Size

      3KB

    • MD5

      46f37f1e167237945d5a68c3a63119ee

    • SHA1

      2bdc80e3a52349f54f8311b0debaf563b8e2f36e

    • SHA256

      537b87663d4c7caed98005590827fc6f1fdf6d1f137efa5f01f85c4c89caeb76

    • SHA512

      807443d45d83c3408929ad9a79f3fd1c4802702f72e558a6832506f2e8bdd443ea00e75b47642fd0d4d80006ff9bfc27f2792f0f3babdeaaba8c8606d066335e

    Score
    3/10
    • Target

      desktop.ini

    • Size

      46B

    • MD5

      872114925d7c336f1b6bf220d3b2e6b7

    • SHA1

      fdd8879ec71e545ba283215ce0c46178e496b513

    • SHA256

      39a3309d74d55301f37ff757eb6f945ac86b310ac09198434f95d5e246aa5310

    • SHA512

      dd5e003efa3f2b36395e79272d6b0d889471d0c8c5c076b7a1218acf7c00ee4c9660e4d1f49ed51a151d37dfd6fa29bd17d60e6508948b8bf4af39f33c135915

    Score
    1/10
    • Target

      sharkbotnetc2.exe

    • Size

      6.9MB

    • MD5

      54797b3e8dac7850a1985866ae500b0d

    • SHA1

      faf0cba6cf510d7bf907a3802506c778381d58a9

    • SHA256

      5e745e0b505d56d135db62d1fb40168905eb7492b75eaa58a8fcea7f9f6e602b

    • SHA512

      787741afee2c9795ac05ce35862aa37a656cfd96edee4324997fbd62cc143559dded94cd08732ce981938dcf3375d77754cd3efb45f719fadec6a9338fdf6ae2

    • SSDEEP

      196608:4aV1FiHB6ylnlPzf+JiJCsmFMvcn6hVvv:AHBRlnlPSa7mmvc+H

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ���k�Yv.pyc

    • Size

      1KB

    • MD5

      4a7b2f4a7ac88dc0b126b2ab3f657b95

    • SHA1

      4ed6aeef872bc205657a5f210d0c2ddb28298031

    • SHA256

      04903284cdc5e2893beb2a3926b9def334f24b33188fa3c2aa375cd94f4fe790

    • SHA512

      9a4f4e37da5c8887a323e55183cee7c54208136261eee81587ad1e663772eda1ce347e6d0c4781fb890d2d221e326a4d39663d6c4c00d1d052cded73ea6272dd

    Score
    1/10
    • Target

      xmmintrin.h

    • Size

      106KB

    • MD5

      04b4174745d9f46d48080aefb7d04c2c

    • SHA1

      478f97abfaba53478b15648f4ed51b0f3f1a4799

    • SHA256

      874f9651d758cfe659021e41794f8e8fede3cbe87caf7a997e58d38eef2b3af3

    • SHA512

      169c8152de3eba1351250e4d08191ee6ead0587734d202aba42356a70d44889f55c1875a5e7e5d15287c7dc1e697db65f049b02702b2fc7ec47e50092aa586a9

    • SSDEEP

      1536:CO0BIl1Fexvtw97q78Nhr9aNhr9QeatQr6qUqYHUqTwE4wxcdFNZFEngbNSKrbsK:mpJC0

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks