General
-
Target
virussign.com_20241209_LimitedFree.zip
-
Size
12.6MB
-
Sample
241210-nx1yeazlbk
-
MD5
6b3d9c02066b33e120cc70909c5806d7
-
SHA1
0af21bb623041bbe95792d11fe64cc4001757409
-
SHA256
8455503a13bf1290304f2cc41b0f3bfbfa88ca7d5276d34c9e42514c270117a6
-
SHA512
84863e117e43246485c51db1dba46f8c014fc9a48bd57861654f0454c80dfa5adf688fdd41f328583d43fad5ef0fba2ac836ade4375a38177b039d7ec81695b6
-
SSDEEP
393216:n9FMWw1QRAZ8PyF8vhNRzVa/8EfDX9SnziNjcP:tw1KBPyWvLRo/8JWla
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Targets
-
-
Target
virussign.com_20241209_LimitedFree.zip
-
Size
12.6MB
-
MD5
6b3d9c02066b33e120cc70909c5806d7
-
SHA1
0af21bb623041bbe95792d11fe64cc4001757409
-
SHA256
8455503a13bf1290304f2cc41b0f3bfbfa88ca7d5276d34c9e42514c270117a6
-
SHA512
84863e117e43246485c51db1dba46f8c014fc9a48bd57861654f0454c80dfa5adf688fdd41f328583d43fad5ef0fba2ac836ade4375a38177b039d7ec81695b6
-
SSDEEP
393216:n9FMWw1QRAZ8PyF8vhNRzVa/8EfDX9SnziNjcP:tw1KBPyWvLRo/8JWla
-
Adds autorun key to be loaded by Explorer.exe on startup
-
Berbew family
-
Phorphiex family
-
Phorphiex payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
XMRig Miner payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1