General
-
Target
1C44852292CF03E534EF8C2914B22436.exe
-
Size
4.4MB
-
Sample
210813-8hdezssf2j
-
MD5
1c44852292cf03e534ef8c2914b22436
-
SHA1
39e0966477f02eadd10e35709d52567e9825f533
-
SHA256
799cb4b1d385475c155fae6fc0c214b059f191ed06b9229f287a8d9225ba8a21
-
SHA512
7b37e8101bc2f6047f69b3283d6aa2f1344a3641b378f03c8b699fe45df742fde8f608204898e810118e47076374b8d9d51e28df71bdf8e530bd39757a906498
Static task
static1
Behavioral task
behavioral1
Sample
1C44852292CF03E534EF8C2914B22436.exe
Resource
win7v20210408
Malware Config
Extracted
vidar
39.9
706
https://prophefliloc.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Extracted
vidar
40
916
https://lenak513.tumblr.com/
-
profile_id
916
Extracted
vidar
40
937
https://lenak513.tumblr.com/
-
profile_id
937
Targets
-
-
Target
1C44852292CF03E534EF8C2914B22436.exe
-
Size
4.4MB
-
MD5
1c44852292cf03e534ef8c2914b22436
-
SHA1
39e0966477f02eadd10e35709d52567e9825f533
-
SHA256
799cb4b1d385475c155fae6fc0c214b059f191ed06b9229f287a8d9225ba8a21
-
SHA512
7b37e8101bc2f6047f69b3283d6aa2f1344a3641b378f03c8b699fe45df742fde8f608204898e810118e47076374b8d9d51e28df71bdf8e530bd39757a906498
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Socelars Payload
-
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE GCleaner Downloader Activity M1
-
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File and Directory Permissions Modification
1Modify Registry
2Web Service
1