Resubmissions

20-12-2024 22:28

241220-2dz4nawmcp 10

20-12-2024 22:06

241220-1z443awjgq 10

General

  • Target

    record.ico

  • Size

    4KB

  • Sample

    241220-1z443awjgq

  • MD5

    1111e06679f96ff28c1e229b06ce7b41

  • SHA1

    9fe5a6c6014b561060a640d0db02a303a35b8832

  • SHA256

    59d5e9106e907fa61a560294a51c14abcde024fdd690e41a7f4d6c88db7287a6

  • SHA512

    077aff77bbf827b9920cf53dff38427475e590c07ab8901fc34ce7b7fb9e9409207e53aff06fa7d1e3984bcf127507d0fc19284d8e7203c76d67c9b98c1c8f37

  • SSDEEP

    48:+8Zjqe+hlcUmCmXGyGC0Uh/2Zr4gvtfyocfR1/mrlR:54Fchp0CuZv44L

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.casalsmd.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Carolina123

Extracted

Family

redline

C2

194.58.69.100:37026

Attributes
  • auth_value

    5f49406bb3e5cfca230ff81efee4edf8

Extracted

Family

cryptbot

C2

befilu45.top

morkoe04.top

Attributes
  • payload_url

    http://mindoi05.top/download.php?file=lv.exe

Extracted

Family

qakbot

Version

325.43

Botnet

abc014

Campaign

1601980173

C2

190.30.185.80:443

75.136.40.155:443

151.73.118.54:443

24.138.77.61:443

84.247.36.26:443

80.240.26.178:443

69.11.247.242:443

71.163.222.203:443

65.131.72.17:995

109.93.11.111:995

80.14.209.42:2222

173.245.152.231:443

173.70.165.101:995

185.246.9.69:995

2.7.65.32:2222

77.30.32.191:995

72.28.255.159:995

69.40.16.109:443

108.46.145.30:443

207.255.161.8:993

Targets

    • Target

      record.ico

    • Size

      4KB

    • MD5

      1111e06679f96ff28c1e229b06ce7b41

    • SHA1

      9fe5a6c6014b561060a640d0db02a303a35b8832

    • SHA256

      59d5e9106e907fa61a560294a51c14abcde024fdd690e41a7f4d6c88db7287a6

    • SHA512

      077aff77bbf827b9920cf53dff38427475e590c07ab8901fc34ce7b7fb9e9409207e53aff06fa7d1e3984bcf127507d0fc19284d8e7203c76d67c9b98c1c8f37

    • SSDEEP

      48:+8Zjqe+hlcUmCmXGyGC0Uh/2Zr4gvtfyocfR1/mrlR:54Fchp0CuZv44L

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Qakbot family

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks