General

  • Target

    JaffaCakes118_4eb9b936c2fb7fade00cbd6ea3209d2dc378ba39cbaf5a74bf6b9c5aebda452d

  • Size

    6.0MB

  • Sample

    241226-wfkh4atjax

  • MD5

    dd64aefb283080eb01bb9a69ec3f6427

  • SHA1

    0b72f179f63ad9c54e699ce8dcfe4b3c54c0b4a7

  • SHA256

    4eb9b936c2fb7fade00cbd6ea3209d2dc378ba39cbaf5a74bf6b9c5aebda452d

  • SHA512

    f06f19e744c1db5e2310363e3f3fc155bb88338333ead94b0665ff8a71d6e8f4f4cd352b544b62a4617bec2439cd56e84ff2b5a821dc8e0106e75a23a2cbd4c6

  • SSDEEP

    98304:JZUnEVxb/iIIH1YTTbGmRsRDOtOezpvkuGwkMgNAshyNNGBvOWzeMvOYDnuYJZN:JDSISq3bGmRsRD0zO91O4yNNGw2OEnzN

Malware Config

Extracted

Family

nullmixer

C2

http://hornygl.xyz/

Extracted

Family

privateloader

C2

http://212.193.30.45/proxies.txt

http://45.144.225.57/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

2.56.59.42

Extracted

Family

socelars

C2

http://www.assassinsx.com/

Extracted

Family

redline

Botnet

05v1user

C2

88.99.35.59:63020

Attributes
  • auth_value

    938f80985c12fe8ee069f692c27f40eb

Extracted

Family

gcleaner

C2

web-stat.biz

privatevolume.bi

Extracted

Family

redline

Botnet

2

C2

193.203.203.82:23108

Attributes
  • auth_value

    52b37b8702d697840527fac8a6ac247d

Targets

    • Target

      JaffaCakes118_4eb9b936c2fb7fade00cbd6ea3209d2dc378ba39cbaf5a74bf6b9c5aebda452d

    • Size

      6.0MB

    • MD5

      dd64aefb283080eb01bb9a69ec3f6427

    • SHA1

      0b72f179f63ad9c54e699ce8dcfe4b3c54c0b4a7

    • SHA256

      4eb9b936c2fb7fade00cbd6ea3209d2dc378ba39cbaf5a74bf6b9c5aebda452d

    • SHA512

      f06f19e744c1db5e2310363e3f3fc155bb88338333ead94b0665ff8a71d6e8f4f4cd352b544b62a4617bec2439cd56e84ff2b5a821dc8e0106e75a23a2cbd4c6

    • SSDEEP

      98304:JZUnEVxb/iIIH1YTTbGmRsRDOtOezpvkuGwkMgNAshyNNGBvOWzeMvOYDnuYJZN:JDSISq3bGmRsRD0zO91O4yNNGw2OEnzN

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Onlylogger family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • OnlyLogger payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

    • Target

      setup_installer.exe

    • Size

      5.9MB

    • MD5

      fc3d693298f610faa5869d6740ec9b23

    • SHA1

      2c4b72aa5678789b3b96a335aa239c1c37872125

    • SHA256

      2d596cc06b63ba36208914b48a365c0609f7c4d0c73b7cf1afd42edcbbfca56f

    • SHA512

      284a2c54d27845347af999ce5409bcd4060f2bd2b6c2a6cb1e702578cb29f6bbc45099b42e72d05c40d74feb8eab9d986a08c53e6ca0399245188718b8e594bc

    • SSDEEP

      98304:xSiIOiocdgYki74N19jlJejgrZUB3+X0mPucTtVCKvYhDlB4cI1iL:x29ocPhq95JNMuXQcjwhDlh

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Onlylogger family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • OnlyLogger payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks