General

  • Target

    cceff411feab78a02a22744e2eae9ab8_JaffaCakes118

  • Size

    3.9MB

  • Sample

    241206-pdd5zasnfp

  • MD5

    cceff411feab78a02a22744e2eae9ab8

  • SHA1

    7b707ac1bfcc7bdd5439c606af91a5dc5a499493

  • SHA256

    cfdcbcca4f75f287d6389cda895571530ddb9a2bbdf54cce52c1c65e969ac0a3

  • SHA512

    0eb9732143fbd7816951acf72bcbf10218a58a4780958b9a57e2d6960781296f73e8f1c0f0262adbb95d855a92e136d87e3e01bea8497d9a8a3e5afa41b3115c

  • SSDEEP

    98304:yLKnNSD/lKELv/i+b0kdcldi1culG9hOAsXl6Ctf9I0ineqI01YO:yB/Q0HFXdczrulG9hO7XBS0inH1YO

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

redline

Botnet

Build1

C2

45.142.213.135:30058

Targets

    • Target

      cceff411feab78a02a22744e2eae9ab8_JaffaCakes118

    • Size

      3.9MB

    • MD5

      cceff411feab78a02a22744e2eae9ab8

    • SHA1

      7b707ac1bfcc7bdd5439c606af91a5dc5a499493

    • SHA256

      cfdcbcca4f75f287d6389cda895571530ddb9a2bbdf54cce52c1c65e969ac0a3

    • SHA512

      0eb9732143fbd7816951acf72bcbf10218a58a4780958b9a57e2d6960781296f73e8f1c0f0262adbb95d855a92e136d87e3e01bea8497d9a8a3e5afa41b3115c

    • SSDEEP

      98304:yLKnNSD/lKELv/i+b0kdcldi1culG9hOAsXl6Ctf9I0ineqI01YO:yB/Q0HFXdczrulG9hO7XBS0inH1YO

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Vidar Stealer

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      setup_installer.exe

    • Size

      3.9MB

    • MD5

      3394285ab7e1ef48bc775f71ed7b0a76

    • SHA1

      646fadf1a0a0dafe07319c86de0587ed96a0fc2b

    • SHA256

      732b086183981289f4dff07f2054fa1356bba8d975359e2f40b6f1adae084467

    • SHA512

      31d754a5f0f005eaf18eed0bd021e2c3698935dd51b10e7c21d4236abe875faf9945aad12e8711da9e42952ab586adf4c98f4a3d6db48e00ab53bb02b7258dc8

    • SSDEEP

      98304:xWCvLUBsgUhDskhlxVOIRNa28BBF4VQMGXB9UpWib:xfLUCgUhDskhlDO28fTAtb

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Vidar Stealer

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks