General
-
Target
9B1F968C977888D8DC114B7DEF70288B.exe
-
Size
2.9MB
-
Sample
210712-9xb1ve3jbx
-
MD5
9b1f968c977888d8dc114b7def70288b
-
SHA1
1db833a0ea9db7e8d5a59db4b5e37496afe7947c
-
SHA256
6bb22351b0b468f3b05880df6e8a61f7ed792d90af19163e703a2c649b53cb14
-
SHA512
0369761ae5e5386ab6b434c9beaca108738bfa80008c0162e31bc541f56564d50e7c9a72ae0fc61ec95afa8a727fee05649f1ca69b6afb70cb81dcc3cf2c9e1a
Static task
static1
Behavioral task
behavioral1
Sample
9B1F968C977888D8DC114B7DEF70288B.exe
Resource
win7v20210408
Malware Config
Extracted
vidar
39.4
933
https://sergeevih43.tumblr.com/
-
profile_id
933
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Extracted
redline
Cana
176.111.174.254:56328
Extracted
vidar
39.4
865
https://sergeevih43.tumblr.com/
-
profile_id
865
Targets
-
-
Target
9B1F968C977888D8DC114B7DEF70288B.exe
-
Size
2.9MB
-
MD5
9b1f968c977888d8dc114b7def70288b
-
SHA1
1db833a0ea9db7e8d5a59db4b5e37496afe7947c
-
SHA256
6bb22351b0b468f3b05880df6e8a61f7ed792d90af19163e703a2c649b53cb14
-
SHA512
0369761ae5e5386ab6b434c9beaca108738bfa80008c0162e31bc541f56564d50e7c9a72ae0fc61ec95afa8a727fee05649f1ca69b6afb70cb81dcc3cf2c9e1a
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Socelars Payload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-