General
-
Target
500A3B64014DE00B03F981299586FAE6.exe
-
Size
5.5MB
-
Sample
210905-pqmmwahfb3
-
MD5
500a3b64014de00b03f981299586fae6
-
SHA1
268186377c6306055e8c42c1a1bde48adcb735b2
-
SHA256
96b3a6f88bebb213230bd38f95804466296c238e0774861ceec6ad4424dcfb45
-
SHA512
fb0f4b59aa74754056252edf1ddc0b4d6fc8a983aa1ff638030bec8b129141915b407b812a4a26c01e65b5b0ed259daab7bcadbb8d9f4c9a53c4d61295629085
Static task
static1
Behavioral task
behavioral1
Sample
500A3B64014DE00B03F981299586FAE6.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
500A3B64014DE00B03F981299586FAE6.exe
Resource
win10v20210408
Malware Config
Extracted
vidar
40.3
706
https://lenko349.tumblr.com/
-
profile_id
706
Extracted
redline
pab777
185.215.113.15:6043
Extracted
raccoon
b8ef25fa9e346b7a31e4b6ff160623dd5fed2474
-
url4cnc
https://telete.in/iphbarberleo
Extracted
metasploit
windows/single_exec
Extracted
vidar
40.4
937
https://romkaxarit.tumblr.com/
-
profile_id
937
Targets
-
-
Target
500A3B64014DE00B03F981299586FAE6.exe
-
Size
5.5MB
-
MD5
500a3b64014de00b03f981299586fae6
-
SHA1
268186377c6306055e8c42c1a1bde48adcb735b2
-
SHA256
96b3a6f88bebb213230bd38f95804466296c238e0774861ceec6ad4424dcfb45
-
SHA512
fb0f4b59aa74754056252edf1ddc0b4d6fc8a983aa1ff638030bec8b129141915b407b812a4a26c01e65b5b0ed259daab7bcadbb8d9f4c9a53c4d61295629085
-
Glupteba Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
VKeylogger Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1