Resubmissions
19-11-2024 14:00
241119-raznlswhle 10General
-
Target
https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.08.7z
-
Sample
241119-raznlswhle
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.08.7z
Resource
win11-20241007-en
Malware Config
Extracted
https://paste.ee/r/WayuW
https://paste.ee/r/YTiFR
Extracted
qakbot
325.43
spx158
1597913961
31.5.21.66:443
49.191.130.48:443
86.98.56.189:443
94.96.40.90:21
24.27.82.216:2222
39.36.137.147:995
216.201.162.158:443
77.30.180.199:995
74.56.167.31:443
67.209.195.198:443
173.173.72.199:443
98.16.204.189:995
2.42.219.242:443
101.108.125.71:443
100.37.36.240:443
72.28.255.159:995
85.122.141.42:995
213.120.109.73:2222
144.202.48.107:443
94.59.241.189:995
188.27.47.246:443
96.41.93.96:443
71.126.139.251:443
47.153.115.154:995
81.133.234.36:2222
75.182.220.196:2222
104.221.4.11:2222
165.120.230.108:2222
137.99.224.198:443
72.204.242.138:443
185.19.190.81:443
209.182.122.217:443
70.164.37.205:995
97.93.211.17:443
70.168.130.172:995
72.66.47.70:443
203.106.195.67:443
31.215.99.5:443
199.116.241.147:443
75.110.250.89:995
207.246.75.201:443
117.218.208.239:443
199.247.16.80:443
156.213.184.5:443
45.32.154.10:443
207.246.71.122:443
80.240.26.178:443
78.100.229.44:61201
197.37.219.90:993
83.110.6.64:2222
87.255.83.83:443
66.30.92.147:443
69.26.23.143:2222
94.59.241.189:2222
65.96.36.157:443
46.53.29.107:443
74.73.120.226:443
217.162.149.212:443
206.51.202.106:50003
47.146.32.175:443
24.37.178.158:443
24.234.86.201:995
175.211.225.118:443
199.16.56.200:443
69.11.247.242:443
39.118.245.6:443
172.91.19.192:443
94.52.160.116:443
31.14.108.114:2222
59.26.204.144:443
2.7.65.32:2222
189.210.114.157:443
95.76.185.240:443
103.76.160.110:443
175.111.128.234:443
2.90.177.57:995
86.122.251.89:2222
5.193.155.181:2078
102.41.113.26:995
115.21.224.117:443
98.22.67.68:443
98.210.41.34:443
93.151.180.170:61202
66.215.32.224:443
35.134.202.234:443
5.235.83.169:995
24.116.227.63:443
68.204.164.222:443
75.87.161.32:995
73.78.149.206:443
141.158.47.123:443
47.138.204.170:443
103.238.231.40:443
151.52.168.224:443
83.110.92.29:443
74.129.24.163:443
89.32.218.159:443
67.165.206.193:993
24.205.42.241:443
45.32.155.12:443
96.20.108.17:2222
199.247.22.145:443
27.32.60.54:443
5.15.65.198:2222
76.111.128.194:443
75.137.239.211:443
200.124.231.21:443
86.127.145.20:2222
41.227.93.247:443
95.77.223.148:443
202.141.244.118:995
188.26.11.29:2222
182.185.59.185:995
47.44.217.98:443
67.170.137.8:443
98.219.77.197:443
82.79.67.68:443
98.4.227.199:443
84.78.128.76:2222
108.178.66.82:995
187.205.125.251:443
96.37.113.36:993
203.198.96.59:443
75.183.171.155:995
75.136.40.155:443
71.80.66.107:443
89.45.107.151:443
193.248.44.2:2222
96.227.127.13:443
65.131.64.201:995
47.28.131.209:443
70.164.39.91:443
37.106.123.0:443
174.19.122.177:2222
173.26.189.151:443
217.165.115.0:990
172.78.30.215:443
149.71.51.228:443
72.204.242.138:32102
72.204.242.138:53
72.204.242.138:50001
72.204.242.138:990
5.13.91.20:995
45.77.215.141:443
188.247.252.243:443
96.243.35.201:443
84.117.176.32:443
172.242.153.56:443
47.206.174.82:443
Extracted
formbook
4.1
r7m
tvdaum.com
slipperylove.com
sajhadabali.com
rulgys.men
sexservidoras.com
jsatvi.loan
yakabuna-webshop.com
texturebarn.net
allsortofgirls.com
biologynoopsyche.net
combsenterprise.com
handsfreeleveler.com
napson.com
gabi.ltd
dengshijiapu.com
boerhesi.com
szbiqiangli.com
lizoschwald.com
fintechmundo.com
kk0799.com
shreerambusiness.com
stansappliancerepaircapecod.com
spartaving.com
friaz.accountant
mlankford.net
fatbich.com
fashionweekk.com
xn--e1ajkbt.xn--80asehdb
laregalade14.com
sq27hd.info
homedecorhandicrafts.com
q2c-guru.com
shanshiduo.net
jadisonbev.com
boschcarservicemartinez.com
thedailydairy.com
okanaganvacationhomes.com
diokolee.com
nyhoop.com
ststranslator.com
degamerpro.com
apowersof.com
legendbailments.com
prestigehmoltd.com
qitsdatasafe.com
5panels.com
shangchezhijia.com
vwuke.top
multimtronik.com
crypto-workshop.com
mdmassagem.com
nrocleoj.com
livingpokke.com
rpeiqp.info
assertivasolucoes.online
elegante1.com
ecopouce.com
sfgnewopportunity.com
touristinforotterdam.online
inagrocerydeliveryok.live
didaskaliaonline.com
zjnyfs.com
theblessedgazette.com
jipiao12580.com
iskovlay.com
Extracted
agenttesla
Protocol: smtp- Host:
mail.tolipgoldenplaza.com - Port:
587 - Username:
[email protected] - Password:
Golden@#$2019
Targets
-
-
Target
https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.08.7z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Ardamax family
-
Ardamax main executable
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazarbackdoor family
-
Detect Neshta payload
-
Formbook family
-
Lokibot family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Oblique family
-
Ostap JavaScript downloader
Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot
-
Ostap family
-
Qakbot family
-
Formbook payload
-
Renames multiple (183) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Discovery
Browser Information Discovery
1Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Query Registry
4Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1