General
-
Target
9ac2e8a076204de0f77a79afcfaf7730d190bcff81c125b164e607c63231bff8.exe
-
Size
3.0MB
-
Sample
210722-4fpxwnqjss
-
MD5
6002cef1c26bedbb75518deb75002cd5
-
SHA1
e6741199938e7915cbf78e5bf91d5a6ecbda9cf6
-
SHA256
9ac2e8a076204de0f77a79afcfaf7730d190bcff81c125b164e607c63231bff8
-
SHA512
e377f52c4fe94e7ca587749d5aa5036c82523638808896affbc0522494d6dfac2e692a5de6f51f61179d8c7ad430da0c47e88e459ea0d09635728940b845dbc3
Static task
static1
Behavioral task
behavioral1
Sample
9ac2e8a076204de0f77a79afcfaf7730d190bcff81c125b164e607c63231bff8.exe
Resource
win7v20210410
Malware Config
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Extracted
redline
sel18
dwarimlari.xyz:80
Extracted
redline
AniNEW
akedauiver.xyz:80
Targets
-
-
Target
9ac2e8a076204de0f77a79afcfaf7730d190bcff81c125b164e607c63231bff8.exe
-
Size
3.0MB
-
MD5
6002cef1c26bedbb75518deb75002cd5
-
SHA1
e6741199938e7915cbf78e5bf91d5a6ecbda9cf6
-
SHA256
9ac2e8a076204de0f77a79afcfaf7730d190bcff81c125b164e607c63231bff8
-
SHA512
e377f52c4fe94e7ca587749d5aa5036c82523638808896affbc0522494d6dfac2e692a5de6f51f61179d8c7ad430da0c47e88e459ea0d09635728940b845dbc3
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-