General
-
Target
SonicSAGE.exe
-
Size
198.2MB
-
Sample
250321-cgqa7avr19
-
MD5
170ac0f07fd31adb71cc556c7aa50c35
-
SHA1
ab1a834ffd57b4e18af5475d299bd04ba14ce472
-
SHA256
680cb9fea15a1f1c5004abd791b1b27383640b985d0f95578871aeacd7d83d0a
-
SHA512
563f5fecaf462efc84aac94510816a9ebd265fbc27fc7a5eefe88b8ab390e6b680d722af9b13e1738b7146924d9aff6ae06f932e8d1f8fee3e92284a06b7dc13
-
SSDEEP
3145728:pFyh9NvfiE4dQw4zhQSGYBuzqVNF1OFZhckc8fHK2duv5B0oi9s4hQWzwwM+rzTB:y4yPQSGY8zqVn4FZvS2MxMs4+MbRSAP
Static task
static1
Behavioral task
behavioral1
Sample
SonicSAGE.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
SonicSAGE.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_3A219DDE.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
lumma
https://phygcsforum.life/api
https://0explorebieology.run/api
https://gadgethgfub.icu/api
https://84moderzysics.top/api
https://techmindzs.live/api
https://ucodxefusion.top/api
https://techspherxe.top/api
https://-earthsymphzony.today/api
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
uGoUQjcjqoZsiRJZ
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
remcos
RemoteHost
else-directors.gl.at.ply.gg:56448
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
$77-Bitdefender.exe
-
copy_folder
Bitdefender
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z3DS2J
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
VisualStudioServer
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
lumma
https://caffegclasiqwp.shop/api
https://stamppreewntnq.shop/api
https://stagedchheiqwo.shop/api
https://millyscroqwp.shop/api
https://evoliutwoqm.shop/api
https://condedqpwqm.shop/api
https://traineiwnqo.shop/api
https://locatedblsoqp.shop/api
Extracted
lumma
https://moderzysics.top/api
Targets
-
-
Target
SonicSAGE.exe
-
Size
198.2MB
-
MD5
170ac0f07fd31adb71cc556c7aa50c35
-
SHA1
ab1a834ffd57b4e18af5475d299bd04ba14ce472
-
SHA256
680cb9fea15a1f1c5004abd791b1b27383640b985d0f95578871aeacd7d83d0a
-
SHA512
563f5fecaf462efc84aac94510816a9ebd265fbc27fc7a5eefe88b8ab390e6b680d722af9b13e1738b7146924d9aff6ae06f932e8d1f8fee3e92284a06b7dc13
-
SSDEEP
3145728:pFyh9NvfiE4dQw4zhQSGYBuzqVNF1OFZhckc8fHK2duv5B0oi9s4hQWzwwM+rzTB:y4yPQSGY8zqVn4FZvS2MxMs4+MbRSAP
-
Detect Xworm Payload
-
Lumma family
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Ragnarlocker family
-
Remcos family
-
Squirrelwaffle family
-
UAC bypass
-
XMRig Miner payload
-
Xmrig family
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3325) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Squirrelwaffle payload
-
Adds policy Run key to start application
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
4Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2