Resubmissions

22-02-2025 17:20

250222-vwwqmavlhl 10

22-02-2025 16:34

250222-t3a7tstphq 10

General

  • Target

    bomb.zip

  • Size

    4KB

  • Sample

    250222-t3a7tstphq

  • MD5

    4d9bd8dafb8299d0fc3fc98f8b8c27d4

  • SHA1

    f3b375208d793e65faabfd237c5391b49f381908

  • SHA256

    94936fb4c7bed2e7233fade7980425b0300451d76a7ac9329c604886e2a9a013

  • SHA512

    5e1efbbe50bdbdea6efe2314ac34eb6c185353318f1171b363062cd88d99f567fef66cacf8c05520dea664c1004e24f74f89db4979e7a17da8f74d022e164e65

  • SSDEEP

    96:iNTZjYifQ0FS3KtpSSIvWClq6gXhiVIntbmfPWu+JtHmfinZxNpph3NPv:iNNjlQR3KtZtCqhiV0qOJjnZxNfh3t

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' folder if you don't get answer within 6 hours. Contact us email: [email protected] [email protected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

Extracted

Family

redline

Botnet

Feb2025

C2

176.65.144.135:65012

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

162.230.48.189:9050

Mutex

e1371af2-3c26-486c-a950-9db9a0954e65

Attributes
  • encryption_key

    B29AF710516F59F4E03DA48D133686BA3D427275

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Startup

  • subdirectory

    SubDir

Extracted

Family

phorphiex

C2

http://91.202.233.141

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' folder if you don't get answer within 6 hours. Contact us email: [email protected] [email protected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

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt

Ransom Note
ATTENTION! Don't worry, you can return your files! All your files like photos, videos and other important documents are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and your key. Do not try to recover your files without a decrypt tool, you may damage them making them impossible to recover we advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' folder if you don't get answer within 6 hours. Contact us email: [email protected] [email protected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

Targets

    • Target

      bomb.exe

    • Size

      12KB

    • MD5

      a14e63d27e1ac1df185fa062103aa9aa

    • SHA1

      2b64c35e4eff4a43ab6928979b6093b95f9fd714

    • SHA256

      dda39f19837168845de33959de34bcfb7ee7f3a29ae55c9fa7f4cb12cb27f453

    • SHA512

      10418efcce2970dcdbef1950464c4001753fccb436f4e8ba5f08f0d4d5c9b4a22a48f2803e59421b720393d84cfabd338497c0bc77cdd4548990930b9c350082

    • SSDEEP

      192:brl2reIazGejA7HhdSbw/z1ULU87glpK/b26J4S1Xu85:b52r+xjALhMWULU870gJJ

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Lokibot family

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • Phorphiex family

    • Phorphiex payload

    • Phorphiex, Phorpiex

      Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • XMRig Miner payload

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Async RAT payload

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • mimikatz is an open source tool to dump credentials on Windows

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Modifies Windows Firewall

    • Stops running service(s)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Indicator Removal: Clear Persistence

      Clear artifacts associated with previously established persistence like scheduletasks on a host.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

Score
1/10

behavioral2

asyncratmeduzamimikatzphorphiexquasarredlinesectopratstormkittyxmrigfeb2025office04credential_accessdefense_evasiondiscoveryexecutionimpactinfostealerloaderminerpersistenceprivilege_escalationpyinstallerransomwareratspywarestealertrojanupxworm
Score
10/10

behavioral3

asyncratmimikatzphorphiexquasarredlinesectopratstormkittyxmrigfeb2025office04credential_accessdefense_evasiondiscoveryexecutionimpactinfostealerloaderminerpersistencepyinstallerransomwareratspywarestealertrojanupxworm
Score
10/10

behavioral4

asyncratlokibotmimikatzphorphiexredlinesectopratstormkittyxmrigfeb2025collectioncredential_accessdefense_evasiondiscoveryexecutionimpactinfostealerloaderminerpersistenceprivilege_escalationransomwareratspywarestealertrojanupxworm
Score
10/10