General

  • Target

    a57069f4ae62e8e046427cde3cdefba5.exe

  • Size

    3.7MB

  • Sample

    210705-p5nm1rsb7s

  • MD5

    a57069f4ae62e8e046427cde3cdefba5

  • SHA1

    4e3330e1536a00681c98b0da78fa9f5ed6eedc65

  • SHA256

    e1fffde5cce94f703cbaf29b14bf0e7569ad207a0a7f4fc63484ced33307198b

  • SHA512

    d1bd989354bea4d0bdf4d9222ee6cffc6eabc79f3d9a965f1efb26b7524abdb4703b0e7b90f92ce27d0e688461c497ae85d9844746fb2280e150d99859f96f03

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

890

C2

https://sergeevih43.tumblr.com

Attributes
  • profile_id

    890

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Targets

    • Target

      a57069f4ae62e8e046427cde3cdefba5.exe

    • Size

      3.7MB

    • MD5

      a57069f4ae62e8e046427cde3cdefba5

    • SHA1

      4e3330e1536a00681c98b0da78fa9f5ed6eedc65

    • SHA256

      e1fffde5cce94f703cbaf29b14bf0e7569ad207a0a7f4fc63484ced33307198b

    • SHA512

      d1bd989354bea4d0bdf4d9222ee6cffc6eabc79f3d9a965f1efb26b7524abdb4703b0e7b90f92ce27d0e688461c497ae85d9844746fb2280e150d99859f96f03

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks