Description
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
d9552a15a61f255df3206b63ee0383be.exe
554KB
211122-p3g8xsfebr
d9552a15a61f255df3206b63ee0383be
7c76e2edcf184b90d40003dac71b08e3a3ed2e8c
0cdd906491990c6ba9c24bdd60172057587859a8e649ba7f4b51fece9a0fdac6
0ce1db824d226df28177b6e5394fa1f8483333583d8332680d4cf0cfc8627a53d69c1c857b319dd200e0f38bf88d445a4289d78472fe3167cc39ae6a85f21599
Family | socelars |
C2 |
http://www.gianninidesign.com/ |
Family | redline |
C2 |
185.92.73.160:46771 |
Family | redline |
Botnet | 13 |
C2 |
136.144.41.178:9295 |
Family | redline |
Botnet | TestBest1 |
C2 |
188.227.87.7:10234 |
Family | smokeloader |
Version | 2020 |
C2 |
http://membro.at/upload/ http://jeevanpunetha.com/upload/ http://misipu.cn/upload/ http://zavodooo.ru/upload/ http://targiko.ru/upload/ http://vues3d.com/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Family | metasploit |
Version | windows/single_exec |
Family | vidar |
Version | 48.6 |
Botnet | 937 |
C2 |
https://mastodon.online/@valhalla https://koyu.space/@valhalla |
Attributes |
profile_id 937 |
Family | redline |
Botnet | udptest |
C2 |
193.56.146.64:65441 |
Family | redline |
Botnet | Ruzki 3k |
C2 |
185.244.181.71:2119 |
Family | redline |
Botnet | ignation |
C2 |
37.9.13.169:63912 |
d9552a15a61f255df3206b63ee0383be.exe
d9552a15a61f255df3206b63ee0383be
554KB
7c76e2edcf184b90d40003dac71b08e3a3ed2e8c
0cdd906491990c6ba9c24bdd60172057587859a8e649ba7f4b51fece9a0fdac6
0ce1db824d226df28177b6e5394fa1f8483333583d8332680d4cf0cfc8627a53d69c1c857b319dd200e0f38bf88d445a4289d78472fe3167cc39ae6a85f21599
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
This typically indicates the parent process was compromised via an exploit or macro.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Detects Themida, an advanced Windows software protection system.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Uses a legitimate IP lookup service to find the infected system's external IP.
Uses a legitimate geolocation service to find the infected system's geolocation info.