General

  • Target

    ca15de24c3fa60e90b343b7376808d1c

  • Size

    4.2MB

  • Sample

    240315-bc6a6scf6v

  • MD5

    ca15de24c3fa60e90b343b7376808d1c

  • SHA1

    e8004170f53ff94665f2ff97a97fb7a78d3a0a74

  • SHA256

    f7a805b251505433e34517da69eccb73955a424bb9d9061309091cf52c07a349

  • SHA512

    8eb9e8f9ea7087aa5cbfb5babd60a5abf31d96d5b245a846420c218a8f40527ed0b1a541a777e23b79170c52db43ad1ba336a399157b2218c4d1784eea1c76d3

  • SSDEEP

    98304:yIfOSOUrxz7b98tUs3nKN/r/i3AF6mwQApnC1VUc21ZBNcPflHM:yIfPOCxzHqB3t5NToVULBNc3a

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

redline

Botnet

pab3

C2

185.215.113.15:61506

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

vidar

Version

40

Botnet

706

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Extracted

Family

cryptbot

C2

knudqw18.top

morzku01.top

Attributes
  • payload_url

    http://saryek01.top/download.php?file=lv.exe

Targets

    • Target

      ca15de24c3fa60e90b343b7376808d1c

    • Size

      4.2MB

    • MD5

      ca15de24c3fa60e90b343b7376808d1c

    • SHA1

      e8004170f53ff94665f2ff97a97fb7a78d3a0a74

    • SHA256

      f7a805b251505433e34517da69eccb73955a424bb9d9061309091cf52c07a349

    • SHA512

      8eb9e8f9ea7087aa5cbfb5babd60a5abf31d96d5b245a846420c218a8f40527ed0b1a541a777e23b79170c52db43ad1ba336a399157b2218c4d1784eea1c76d3

    • SSDEEP

      98304:yIfOSOUrxz7b98tUs3nKN/r/i3AF6mwQApnC1VUc21ZBNcPflHM:yIfPOCxzHqB3t5NToVULBNc3a

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      setup_installer.exe

    • Size

      4.2MB

    • MD5

      baf330c66dc494f59980816acd04c9da

    • SHA1

      7f394f6664318aae1e8b351ee8f6952957bd957c

    • SHA256

      8ba4bd3b729779ced975109d4c7c427baf7ab6b011bf9ac1c0ea0419c102bb60

    • SHA512

      1dccc6560b5b5a2a921501a3fe115fa7338bc7d354bce2292f2326d02fa7fcbf85c01d6143d1d857920f3573de4d8fe375fc5afd4bdefcd2c26224109c0d667e

    • SSDEEP

      98304:xcCvLUBsgrye6P8kqRj0FZp4zwkVyEXnXOb+6V:xBLUCgry5P8zRwFZez7BubP

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

4
T1112

Subvert Trust Controls

2
T1553

Install Root Certificate

2
T1553.004

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

4
T1552.001

Discovery

Query Registry

11
T1012

System Information Discovery

9
T1082

Peripheral Device Discovery

2
T1120

Remote System Discovery

2
T1018

Collection

Data from Local System

4
T1005

Command and Control

Web Service

2
T1102

Tasks