Description
Ransomware which is a variant of the STOP family.
ha.exe
4MB
211023-s8gq5acdb8
2e366651b4505eadbeca48889144f452
4c729b09c03f98019c0cf19fd3f22b7500772f3f
070798072999f8c0c6bdf3c166e42c2eeb2d50a446d2710a2b581c51dd221b3d
6ab6940151b61c03a18b0157e59d4918ac64237cad1f399d0a04d03ecf651145158c84515a2e74a925ea4cc3386b459cc049cd645ec52babc6287ee4127bad5f
Family | smokeloader |
Version | 2020 |
C2 |
http://directorycart.com/upload/ http://tierzahnarzt.at/upload/ http://streetofcards.com/upload/ http://ycdfzd.com/upload/ http://successcoachceo.com/upload/ http://uhvu.cn/upload/ http://japanarticle.com/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Family | redline |
Botnet | ChrisNEW |
C2 |
194.104.136.5:46013 |
Family | vidar |
Version | 41.5 |
Botnet | 933 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 933 |
Family | vidar |
Version | 41.5 |
Botnet | 937 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 937 |
Family | raccoon |
Botnet | 7c9b4504a63ed23664e38808e65948379b790395 |
Attributes |
url4cnc http://telegka.top/capibar http://telegin.top/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | djvu |
C2 |
http://rlrz.org/lancer |
ha.exe
2e366651b4505eadbeca48889144f452
4MB
4c729b09c03f98019c0cf19fd3f22b7500772f3f
070798072999f8c0c6bdf3c166e42c2eeb2d50a446d2710a2b581c51dd221b3d
6ab6940151b61c03a18b0157e59d4918ac64237cad1f399d0a04d03ecf651145158c84515a2e74a925ea4cc3386b459cc049cd645ec52babc6287ee4127bad5f
Ransomware which is a variant of the STOP family.
NetSupport is a remote access tool sold as a legitimate system administration software.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
Zloader is a malware strain that was initially discovered back in August 2015.
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
Detects executables packed with ASPack v2.12-2.42
Ransomware generally changes the extension on encrypted files.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Attempts to read the root path of hard drives other than the default C: drive.
Uses a legitimate IP lookup service to find the infected system's external IP.