General
-
Target
Vaz.2010.2.1.4.v.2.1.4.serial.number.keygen.exe
-
Size
5.9MB
-
Sample
210907-weyz4adah3
-
MD5
4e149b434b6ac78125b4be483cba75cc
-
SHA1
8ff2e792cdaf9b7e05c4da4e4da618354743b251
-
SHA256
3dc2b16c3c1de6e2b5408c3ed68b9ef245afc298b91bb74af9368186e89e3e8b
-
SHA512
e96981ec1ad48ac3f5c7ffd5a6da2c6c13a581a94ee473a7b069ef15a4ae182d7f6a129723a5d5ab10011139b13748600e98e23f2bf8c16ee8d56501a020a84f
Static task
static1
Behavioral task
behavioral1
Sample
Vaz.2010.2.1.4.v.2.1.4.serial.number.keygen.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Vaz.2010.2.1.4.v.2.1.4.serial.number.keygen.exe
Resource
win11
Behavioral task
behavioral3
Sample
Vaz.2010.2.1.4.v.2.1.4.serial.number.keygen.exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Vaz.2010.2.1.4.v.2.1.4.serial.number.keygen.exe
Resource
win10-en
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://fazanaharahe1.xyz/
http://xandelissane2.xyz/
http://ustiassosale3.xyz/
http://cytheriata4.xyz/
http://ggiergionard5.xyz/
http://rrelleynaniy6.store/
http://danniemusoa7.store/
http://nastanizab8.store/
http://onyokandis9.store/
http://dmunaavank10.store/
http://gilmandros11.site/
http://cusanthana12.site/
http://willietjeana13.site/
http://ximusokall14.site/
http://blodinetisha15.site/
http://urydiahadyss16.club/
http://glasamaddama17.club/
http://marlingarly18.club/
http://alluvianna19.club/
http://xandirkaniel20.club/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Targets
-
-
Target
Vaz.2010.2.1.4.v.2.1.4.serial.number.keygen.exe
-
Size
5.9MB
-
MD5
4e149b434b6ac78125b4be483cba75cc
-
SHA1
8ff2e792cdaf9b7e05c4da4e4da618354743b251
-
SHA256
3dc2b16c3c1de6e2b5408c3ed68b9ef245afc298b91bb74af9368186e89e3e8b
-
SHA512
e96981ec1ad48ac3f5c7ffd5a6da2c6c13a581a94ee473a7b069ef15a4ae182d7f6a129723a5d5ab10011139b13748600e98e23f2bf8c16ee8d56501a020a84f
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Glupteba Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1