General

  • Target

    a03a81809197237dc58aec8238984901660f2e9e0c82f62ed869c8dc7f75534c.exe

  • Size

    938KB

  • Sample

    250308-n3z83awqz4

  • MD5

    f0c2d05b630a935286cf46bd832b9767

  • SHA1

    8b633d665a47f60cd4ff3a96c0acab7c51d0811b

  • SHA256

    a03a81809197237dc58aec8238984901660f2e9e0c82f62ed869c8dc7f75534c

  • SHA512

    25c9eda1e76562a6d8666e6a4128cf25cfc1849231a6adf2a694e7262d82eafc01bcc8cd0bceb53bf194d496fdacebffda440852a19b7d74d0027e5365f3d462

  • SSDEEP

    24576:8qDEvCTbMWu7rQYlBQcBiT6rprG8a0Gu:8TvC/MTQYxsWR7a0G

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://garisechairedd.shop/api

https://begindecafer.world/api

https://garagedrootz.top/api

https://0modelshiverd.icu/api

https://arisechairedd.shop/api

https://catterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://sterpickced.digital/api

https://9garagedrootz.top/api

https://modelshiverd.icu/api

https://ksterpickced.digital/api

https://dawtastream.bet/api

https://foresctwhispers.top/api

https://tracnquilforest.life/api

https://xcollapimga.fun/api

https://strawpeasaen.fun/api

https://jquietswtreams.life/api

https://starrynsightsky.icu/api

https://earthsymphzony.today/api

Extracted

Family

redline

Botnet

Build 7

C2

101.99.92.190:40919

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7422040068:AAHBRAyMfugAv0ymRxdvdbE8JdRhnzBsTiA/sendDocument?chat_id=6659240710&caption=%0APC%20USER%20INFORMATION:%0A%20%20%20%20%F0%9F%91%81%20%3Ccode%3E212.102.63.147%3C/code%3E%20United%20Kingdom%0A%20%20%20%20%F0%9F%91%A4%20TRGWVDJS%20%7C%20Admin%0A%20%20%20%20%E2%9A%99%EF%B8%8F%20%3Ccode%3EWindows%2010%20Pro%20(64%20Bit)%3C/code%3E%0ABASIC%20INFORMATION:%0A%20%20%20%20Passwords%20-%20%3Ccode%3E0%3C/code%3E%0A%20%20%20%20AutoFiles%20-%20%3Ccode%3E0%3C/code%3E%0A%20%20%20%20Cookies%20-%20%3Ccode%3E0%3C/code%3E%0A%20%20%20%20CC%20-%20%3Ccode%3E0%3C/code%3E%0A%20GRABBED%20SOFTWARE:%0A%20DOMAINS%20DETECTED:%0A%20-%20&parse_mode=HTM

Targets

    • Target

      a03a81809197237dc58aec8238984901660f2e9e0c82f62ed869c8dc7f75534c.exe

    • Size

      938KB

    • MD5

      f0c2d05b630a935286cf46bd832b9767

    • SHA1

      8b633d665a47f60cd4ff3a96c0acab7c51d0811b

    • SHA256

      a03a81809197237dc58aec8238984901660f2e9e0c82f62ed869c8dc7f75534c

    • SHA512

      25c9eda1e76562a6d8666e6a4128cf25cfc1849231a6adf2a694e7262d82eafc01bcc8cd0bceb53bf194d496fdacebffda440852a19b7d74d0027e5365f3d462

    • SSDEEP

      24576:8qDEvCTbMWu7rQYlBQcBiT6rprG8a0Gu:8TvC/MTQYxsWR7a0G

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Netsupport family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Download via BitsAdmin

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Sets service image path in registry

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks