General
-
Target
a2932135d6a95b6756ca3cbf02b8a549_JaffaCakes118
-
Size
3.8MB
-
Sample
241126-sdd2raslhq
-
MD5
a2932135d6a95b6756ca3cbf02b8a549
-
SHA1
39175d13b977b9b12fa4f1cbe49abe1c0821b1dc
-
SHA256
6430e35390b94f25e609d8dc2edadd8f6b0b30bec768ce894c67028de438ab13
-
SHA512
6e725c150a7d9ccf461be588697969c77f3d193d24aba7417d9439261792b4cd8997a083a22355852a198c3001c1ba9ac02df4112680874bbeeffc64a5633f0d
-
SSDEEP
98304:x52CheDFNYJ7QibVvhPXIaZ1eCvLUBsKxEK+:xSPYJskRDZ13LUCKc
Static task
static1
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
redline
OLK
zisiarenal.xyz:80
Targets
-
-
Target
a2932135d6a95b6756ca3cbf02b8a549_JaffaCakes118
-
Size
3.8MB
-
MD5
a2932135d6a95b6756ca3cbf02b8a549
-
SHA1
39175d13b977b9b12fa4f1cbe49abe1c0821b1dc
-
SHA256
6430e35390b94f25e609d8dc2edadd8f6b0b30bec768ce894c67028de438ab13
-
SHA512
6e725c150a7d9ccf461be588697969c77f3d193d24aba7417d9439261792b4cd8997a083a22355852a198c3001c1ba9ac02df4112680874bbeeffc64a5633f0d
-
SSDEEP
98304:x52CheDFNYJ7QibVvhPXIaZ1eCvLUBsKxEK+:xSPYJskRDZ13LUCKc
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Xmrig family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2