General
-
Target
RNSM00289.7z
-
Size
14.9MB
-
Sample
241119-v37fpszbpj
-
MD5
68b02160792ed3b724be029d22b53cd5
-
SHA1
da6bd91646185c7237dff572273b3ee1ef7f1459
-
SHA256
05ff08303f072bd86cd817fd302e25c1571f145a015f1ee306b58c2048d9df27
-
SHA512
0df3ad1723cdd640a77d800210af026f67727183342906d9026741f98622722d2c429a8c1026670cf90922701a4948b28bd731fc52aa1c6e65ba57b4ddf42d1a
-
SSDEEP
393216:YhSZ5IDwaY+R/wpy6kJ2C/vqx2e7E9Ir1Da:GSZ5E3i/kJ2CK7Ec1W
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00289.7z
Resource
win7-20241010-en
Malware Config
Extracted
Protocol: ftp- Host:
45.203.22.130 - Port:
21 - Username:
anonymous - Password:
Admin
Extracted
Protocol: ftp- Host:
216.116.26.93 - Port:
21 - Username:
www-data - Password:
ftp
Extracted
Protocol: ftp- Host:
195.181.223.73 - Port:
21 - Username:
admin
Extracted
Protocol: ftp- Host:
85.54.121.208 - Port:
21 - Username:
Admin - Password:
www-data
Extracted
Protocol: ftp- Host:
121.160.124.55 - Port:
21 - Username:
anonymous - Password:
Admin
Extracted
Protocol: ftp- Host:
156.226.50.97 - Port:
21 - Username:
admin - Password:
www-data
Extracted
Protocol: ftp- Host:
101.100.241.183 - Port:
21 - Username:
admin - Password:
Admin
Extracted
Protocol: ftp- Host:
138.91.88.14 - Port:
21 - Username:
ftp - Password:
Admin
Extracted
Protocol: ftp- Host:
3.110.16.253 - Port:
21 - Username:
admin - Password:
anonymous
Extracted
Protocol: ftp- Host:
35.212.40.22 - Port:
21 - Username:
ftp - Password:
admin
Extracted
Protocol: ftp- Host:
150.254.230.192 - Port:
21 - Username:
admin - Password:
admin
Extracted
Protocol: ftp- Host:
185.56.234.65 - Port:
21 - Username:
ftp
Extracted
Protocol: ftp- Host:
207.150.208.8 - Port:
21 - Username:
ftp - Password:
Admin
Extracted
Protocol: ftp- Host:
154.195.64.102 - Port:
21 - Username:
ftp - Password:
Admin
Extracted
Protocol: ftp- Host:
210.236.36.247 - Port:
21 - Username:
admin - Password:
www-data
Extracted
Protocol: ftp- Host:
109.106.253.168 - Port:
21 - Username:
www-data - Password:
www-data
Extracted
Protocol: ftp- Host:
38.239.157.218 - Port:
21 - Username:
ftp - Password:
anonymous
Extracted
Protocol: ftp- Host:
50.115.172.243 - Port:
21 - Username:
Admin - Password:
www-data
Extracted
Protocol: ftp- Host:
94.103.45.189 - Port:
21 - Username:
anonymous - Password:
Admin
Extracted
Protocol: ftp- Host:
74.48.105.231 - Port:
21 - Username:
www-data - Password:
anonymous
Extracted
Protocol: ftp- Host:
79.96.68.226 - Port:
21 - Username:
ftp
Extracted
Protocol: ftp- Host:
158.199.159.27 - Port:
21 - Username:
anonymous - Password:
anonymous
Extracted
Protocol: ftp- Host:
156.241.157.57 - Port:
21 - Username:
anonymous - Password:
www-data
Extracted
Protocol: ftp- Host:
38.207.18.137 - Port:
21 - Username:
admin - Password:
Admin
Extracted
Protocol: ftp- Host:
35.213.171.71 - Port:
21 - Username:
ftp - Password:
anonymous
Extracted
Protocol: ftp- Host:
38.11.68.48 - Port:
21 - Username:
www-data - Password:
Admin
Extracted
Protocol: ftp- Host:
160.124.246.197 - Port:
21 - Username:
www-data - Password:
anonymous
Extracted
Protocol: ftp- Host:
79.96.232.99 - Port:
21 - Username:
ftp
Extracted
Protocol: ftp- Host:
138.201.82.219 - Port:
21 - Username:
anonymous - Password:
Admin
Extracted
Protocol: ftp- Host:
80.74.153.15 - Port:
21 - Username:
anonymous - Password:
www-data
Extracted
Protocol: ftp- Host:
182.189.54.147 - Port:
21 - Username:
Admin - Password:
www-data
Extracted
Protocol: ftp- Host:
161.53.35.23 - Port:
21 - Username:
admin - Password:
Admin
Extracted
gozi
Extracted
xtremerat
flashplayerupdate.sytes.net
Targets
-
-
Target
RNSM00289.7z
-
Size
14.9MB
-
MD5
68b02160792ed3b724be029d22b53cd5
-
SHA1
da6bd91646185c7237dff572273b3ee1ef7f1459
-
SHA256
05ff08303f072bd86cd817fd302e25c1571f145a015f1ee306b58c2048d9df27
-
SHA512
0df3ad1723cdd640a77d800210af026f67727183342906d9026741f98622722d2c429a8c1026670cf90922701a4948b28bd731fc52aa1c6e65ba57b4ddf42d1a
-
SSDEEP
393216:YhSZ5IDwaY+R/wpy6kJ2C/vqx2e7E9Ir1Da:GSZ5E3i/kJ2CK7Ec1W
-
Cerber family
-
Gozi family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Contacts a large (18944) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
3File Deletion
3Modify Registry
2