d8ba690a888d144be39d35edbb8c1b0b.exe
d8ba690a888d144be39d35edbb8c1b0b.exe
402KB
211030-k82gjaega8
d8ba690a888d144be39d35edbb8c1b0b
236d096f35b8fb375f0604b723016e34d3ed186f
fdadaa29cddfdc73c668258fea6614be64a933dcfa19072a6342024985a0a68b
98b42d6ddfc9bacf44f103ff1df0399c2985d63e8939f8641816b6042397bf44a721f991bb3e9a50ec67fa3d89182727af0cc2a51d3b201f83d6af177ba45c75
Extracted
Family | xloader |
Version | 2.5 |
Campaign | s0iw |
C2 |
http://www.kyiejenner.com/s0iw/ |
Decoy |
ortopediamodelo.com orimshirts.store universecatholicweekly.info yvettechan.com sersaudavelsempre.online face-booking.net europeanretailgroup.com umofan.com roemahbajumuslim.online joyrosecuisine.net 3dmaker.house megdb.xyz stereoshopie.info gv5rm.com tdc-trust.com mcglobal.club choral.works onlineconsultantgroup.com friscopaintandbody.com midwestii.com weespiel.com babyshell.be gwynora.com talkthered.com f-punk.com frankmatlock.com clique-solicite.net clientloyaltysystem.com worldbyduco.com kampfsport-erfurt.com adndpanel.xyz rocknfamily.net ambr-creative.com wwwks8829.com thuexegiarehcmgoviet.com brentmurrell.art wolf-yachts.com tenpobiz.com binnamall.com crestamarti.quest terry-hitchcock.com ocreverseteam.com taxwarehouse2.xyz megawholesalesystem.com epstein-advisory.com enewlaunches.com iphone13.community pianostands.com newspaper.clinic alamdave.com |
Extracted
Family | redline |
Botnet | @kugurtilzt |
C2 |
185.215.113.79:41465 |
Extracted
Family | redline |
Botnet | ddddd4 |
C2 |
91.206.14.151:16764 |
Extracted
Family | vidar |
Version | 41.6 |
Botnet | 937 |
C2 |
https://mas.to/@lilocc |
Attributes |
profile_id 937 |
Extracted
Family | smokeloader |
Version | 2020 |
C2 |
http://brandyjaggers.com/upload/ http://andbal.com/upload/ http://alotofquotes.com/upload/ http://szpnc.cn/upload/ http://uggeboots.com/upload/ http://100klv.com/upload/ http://rapmusic.at/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Extracted
Family | raccoon |
Botnet | 8dec62c1db2959619dca43e02fa46ad7bd606400 |
Attributes |
url4cnc http://telegin.top/capibar http://ttmirror.top/capibar http://teletele.top/capibar http://telegalive.top/capibar http://toptelete.top/capibar http://telegraf.top/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Extracted
Family | vidar |
Version | 41.6 |
Botnet | 933 |
C2 |
https://mas.to/@lilocc |
Attributes |
profile_id 933 |
d8ba690a888d144be39d35edbb8c1b0b.exe
d8ba690a888d144be39d35edbb8c1b0b
402KB
236d096f35b8fb375f0604b723016e34d3ed186f
fdadaa29cddfdc73c668258fea6614be64a933dcfa19072a6342024985a0a68b
98b42d6ddfc9bacf44f103ff1df0399c2985d63e8939f8641816b6042397bf44a721f991bb3e9a50ec67fa3d89182727af0cc2a51d3b201f83d6af177ba45c75
Tags
Signatures
-
Modifies Windows Defender Real-time Protection settings
-
Process spawned unexpected child process
Description
This typically indicates the parent process was compromised via an exploit or macro.
-
Raccoon
Description
Simple but powerful infostealer which was very active in 2019.
Tags
-
RedLine
Description
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Tags
-
RedLine Payload
-
SmokeLoader
Description
Modular backdoor trojan in use since 2014.
Tags
-
Socelars
Description
Socelars is an infostealer targeting browser cookies and credit card credentials.
Tags
-
Socelars Payload
-
Vidar
Description
Vidar is an infostealer based on Arkei stealer.
Tags
-
Xloader
Description
Xloader is a rebranded version of Formbook malware.
Tags
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Tags
TTPs
-
Nirsoft
-
Vidar Stealer
Tags
-
Xloader Payload
Tags
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
Description
BIOS information is often read in order to detect sandboxing environments.
TTPs
-
Checks computer location settings
Description
Looks up country code configured in the registry, likely geofence.
TTPs
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Themida packer
Description
Detects Themida, an advanced Windows software protection system.
Tags
-
Checks installed software on the system
Description
Looks up Uninstall key entries in the registry to enumerate software on the system.
Tags
TTPs
-
Checks whether UAC is enabled
Tags
TTPs
-
Legitimate hosting services abused for malware hosting/C2
TTPs
-
Looks up external IP address via web service
Description
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext