Setup.exe
Setup.exe
403KB
211031-vep7hsgbf2
d1b2c8ddca2f8dd02e2c132153055084
21c011ac7406eef048c175f5887e4eb885c050d6
506c2f513d64242fcb20ccff8c26c0ed1755fe9120b984c29ba224b311d635c3
ab73df911df41235159341cc8fefed284a3f9720f241b51dfe2db2ac415b3438d5fbbeacfa980a61d402edc64afeda87447ccda49b7d279fba524036e9287594
Extracted
Family | xloader |
Version | 2.5 |
Campaign | s0iw |
C2 |
http://www.kyiejenner.com/s0iw/ |
Decoy |
ortopediamodelo.com orimshirts.store universecatholicweekly.info yvettechan.com sersaudavelsempre.online face-booking.net europeanretailgroup.com umofan.com roemahbajumuslim.online joyrosecuisine.net 3dmaker.house megdb.xyz stereoshopie.info gv5rm.com tdc-trust.com mcglobal.club choral.works onlineconsultantgroup.com friscopaintandbody.com midwestii.com weespiel.com babyshell.be gwynora.com talkthered.com f-punk.com frankmatlock.com clique-solicite.net clientloyaltysystem.com worldbyduco.com kampfsport-erfurt.com adndpanel.xyz rocknfamily.net ambr-creative.com wwwks8829.com thuexegiarehcmgoviet.com brentmurrell.art wolf-yachts.com tenpobiz.com binnamall.com crestamarti.quest terry-hitchcock.com ocreverseteam.com taxwarehouse2.xyz megawholesalesystem.com epstein-advisory.com enewlaunches.com iphone13.community pianostands.com newspaper.clinic alamdave.com |
Extracted
Family | redline |
Botnet | dfd3 |
C2 |
91.206.14.151:16764 |
Extracted
Family | redline |
C2 |
45.9.20.149:10844 |
Extracted
Family | redline |
Botnet | logxxx |
C2 |
64.56.67.136:55730 |
Extracted
Family | vidar |
Version | 41.6 |
Botnet | 937 |
C2 |
https://mas.to/@lilocc |
Attributes |
profile_id 937 |
Extracted
Family | raccoon |
Botnet | 8dec62c1db2959619dca43e02fa46ad7bd606400 |
Attributes |
url4cnc http://telegin.top/capibar http://ttmirror.top/capibar http://teletele.top/capibar http://telegalive.top/capibar http://toptelete.top/capibar http://telegraf.top/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Extracted
Family | vidar |
Version | 41.6 |
Botnet | 921 |
C2 |
https://mas.to/@lilocc |
Attributes |
profile_id 921 |
Extracted
Family | smokeloader |
Version | 2020 |
C2 |
http://honawey70.top/ http://wijibui00.top/ |
rc4.i32 |
|
rc4.i32 |
|
Extracted
Family | vidar |
Version | 41.6 |
Botnet | 933 |
C2 |
https://mas.to/@lilocc |
Attributes |
profile_id 933 |
Setup.exe
d1b2c8ddca2f8dd02e2c132153055084
403KB
21c011ac7406eef048c175f5887e4eb885c050d6
506c2f513d64242fcb20ccff8c26c0ed1755fe9120b984c29ba224b311d635c3
ab73df911df41235159341cc8fefed284a3f9720f241b51dfe2db2ac415b3438d5fbbeacfa980a61d402edc64afeda87447ccda49b7d279fba524036e9287594
Tags
Signatures
-
Modifies Windows Defender Real-time Protection settings
-
Raccoon
Description
Simple but powerful infostealer which was very active in 2019.
Tags
-
RedLine
Description
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Tags
-
RedLine Payload
-
SmokeLoader
Description
Modular backdoor trojan in use since 2014.
Tags
-
Socelars
Description
Socelars is an infostealer targeting browser cookies and credit card credentials.
Tags
-
Socelars Payload
-
Vidar
Description
Vidar is an infostealer based on Arkei stealer.
Tags
-
Xloader
Description
Xloader is a rebranded version of Formbook malware.
Tags
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Tags
TTPs
-
Vidar Stealer
Tags
-
Xloader Payload
Tags
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
Description
BIOS information is often read in order to detect sandboxing environments.
TTPs
-
Checks computer location settings
Description
Looks up country code configured in the registry, likely geofence.
TTPs
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Themida packer
Description
Detects Themida, an advanced Windows software protection system.
Tags
-
Checks whether UAC is enabled
Tags
TTPs
-
Legitimate hosting services abused for malware hosting/C2
TTPs
-
Looks up external IP address via web service
Description
Uses a legitimate IP lookup service to find the infected system's external IP.