Tags:
family:glupteba family:metasploit family:raccoon family:redline family:socelars family:xmrig botnet:022f7f19749a47aa4d6a10b25bfd352ecb963373 botnet:mix 14.08 backdoor discovery dropper infostealer loader miner persistence spyware stealer suricata trojan
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Process spawned unexpected child process
Suspicious use of NtCreateUserProcessOtherParentProcess
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE GCleaner Downloader Activity M3
suricata: ET MALWARE GCleaner Related Downloader User-Agent
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
C2 Extraction:
185.215.113.17:18597
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.