Description
Ransomware which is a variant of the STOP family.
setup_x86_x64_install.exe
4MB
211027-qv56fshbbk
4fb905881241f7cec09bfc91858931e6
51aa57dd56637f8fa8332eae9c846ec5be379b95
f2f7017a9fb071deaaee04e1cbe071d6d207e19852143148a4bc2ecf83b2195b
111ee308e8669d76737a92968c3420acb3cd57f4f2e5efcc2e020568a9e98bacbe4c9b2ebc361cda226484108beef323b4dd36fab9f957556e0e94dbd5246b31
Family | socelars |
C2 |
http://www.iyiqian.com/ http://www.hbgents.top/ http://www.rsnzhy.com/ http://www.efxety.top/ |
Family | redline |
Botnet | media26 |
C2 |
91.121.67.60:23325 |
Family | redline |
Botnet | chris |
C2 |
194.104.136.5:46013 |
Family | smokeloader |
Version | 2020 |
C2 |
http://brandyjaggers.com/upload/ http://andbal.com/upload/ http://alotofquotes.com/upload/ http://szpnc.cn/upload/ http://uggeboots.com/upload/ http://100klv.com/upload/ http://rapmusic.at/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Family | vidar |
Version | 41.6 |
Botnet | 933 |
C2 |
https://mas.to/@lilocc |
Attributes |
profile_id 933 |
setup_x86_x64_install.exe
4fb905881241f7cec09bfc91858931e6
4MB
51aa57dd56637f8fa8332eae9c846ec5be379b95
f2f7017a9fb071deaaee04e1cbe071d6d207e19852143148a4bc2ecf83b2195b
111ee308e8669d76737a92968c3420acb3cd57f4f2e5efcc2e020568a9e98bacbe4c9b2ebc361cda226484108beef323b4dd36fab9f957556e0e94dbd5246b31
Ransomware which is a variant of the STOP family.
Formbook is a data stealing malware which is capable of stealing data.
This typically indicates the parent process was compromised via an exploit or macro.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
Detects executables packed with ASPack v2.12-2.42
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Attempts to read the root path of hard drives other than the default C: drive.
Uses a legitimate IP lookup service to find the infected system's external IP.
Uses a legitimate geolocation service to find the infected system's geolocation info.
AutoIT scripts compiled to PE executables.