Resubmissions

General

  • Target

    Spectra Setup.exe

  • Size

    47.6MB

  • Sample

    240603-tvy9pacb9z

  • MD5

    9865ea7b0c864c9cb7b402d719cc866e

  • SHA1

    dc9e1f78e8b7211ed2390a513cfb1f42d1468c6e

  • SHA256

    cced68e78da1e155cdc09eec9df2bd6e41d8597fbc0084b10e741ebebe7f46b7

  • SHA512

    0ad597ce5bb9f526143574bfaf29076b1ce8dac69b5750b83406914e2005a9f21039f438b05fb03f1c808c93b0f57811c1e4f1c46dd44e10ccf71efca880e4f2

  • SSDEEP

    786432:rjNnc3RM8Wugj/yqiJgNlGxnvG6yRDiWH/9e03f2kzszUyIoBMPj+mRPF:rjNncBG/7i2unvRyx/Z+HIoBa7

Malware Config

Extracted

Family

stealc

Botnet

doralands1

C2

http://45.88.79.153

Attributes
  • url_path

    /e36377ea7ac96c9f.php

Targets

    • Target

      Spectra Setup.exe

    • Size

      47.6MB

    • MD5

      9865ea7b0c864c9cb7b402d719cc866e

    • SHA1

      dc9e1f78e8b7211ed2390a513cfb1f42d1468c6e

    • SHA256

      cced68e78da1e155cdc09eec9df2bd6e41d8597fbc0084b10e741ebebe7f46b7

    • SHA512

      0ad597ce5bb9f526143574bfaf29076b1ce8dac69b5750b83406914e2005a9f21039f438b05fb03f1c808c93b0f57811c1e4f1c46dd44e10ccf71efca880e4f2

    • SSDEEP

      786432:rjNnc3RM8Wugj/yqiJgNlGxnvG6yRDiWH/9e03f2kzszUyIoBMPj+mRPF:rjNncBG/7i2unvRyx/Z+HIoBa7

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks