General
-
Target
PASSWORD_IS_951951____IDM-Crack-640-B.zip
-
Size
8.6MB
-
Sample
220105-b556wahge3
-
MD5
482849f43a1d71e9eb58d97353c052ef
-
SHA1
0f69fc70eff2bb3ba76977bafbe8ee419898c3d1
-
SHA256
f996dbc1dae293ad6da02a41a4ab9384c3ba1c434d9fa2a7307677d7d6943a8c
-
SHA512
a6f99ef7b3e89e38a15225fe5e99c38136569b124ab1bc05c188d790c89bd9abfc667ace41f0cad5a729e301777195685e67ea6b68d004526595c43af25cb698
Static task
static1
Behavioral task
behavioral1
Sample
149_setupInstaller.exe
Resource
win7-en-20211208
Malware Config
Extracted
socelars
http://www.chosenncrowned.com/
Extracted
smokeloader
2020
http://melchen-testet.at/upload/
http://zjymf.com/upload/
http://pbxbmu70275.cn/upload/
http://mnenenravitsya.ru/upload/
http://pitersprav.ru/upload/
Extracted
cryptbot
$
zyokao27.top
moreja02.top
-
payload_url
http://yaphsq02.top/download.php?file=cantey.exe
Targets
-
-
Target
149_setupInstaller.exe
-
Size
8.6MB
-
MD5
2d8c3a99a2a96f91e8bfa44a780d3d4e
-
SHA1
0ad62ec8ef2814443f975521e8ce889ade56915c
-
SHA256
dffb22f9370faab01c48fa788b0ea99200d9996c9e7039e8e8b39d7311a3f05b
-
SHA512
0cfc89cc345ebf42ddf2c448bf7b545a5c33d867747a39d83000809434490e38cd6849fa3a921f61f5c0e8c47b19e7398e844d5d35151351b3a522daa5967aba
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Socelars Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-