General
-
Target
2C3382E9EB5BBBFE86A88F9D8A75557C3F60707AF088C.exe
-
Size
7.0MB
-
Sample
220916-sgqjysbgdr
-
MD5
4792058ffed5c341273deda070de0805
-
SHA1
3020acf6e6493d6387e60bdbb6a3d6d895c85726
-
SHA256
2c3382e9eb5bbbfe86a88f9d8a75557c3f60707af088ce5f1283ee7a33cc3fbf
-
SHA512
657247736889b952c133d1ecfeaf9a8dd11f794446c70ac075145bba439074004136419d158a22c392dd14baee0e6fb2895019082367f752d4d0c568c5fdb554
-
SSDEEP
196608:xXLUCgOYr1yYDb8Irpd6lT9smQeJtegm5diN4vQ4KQcubAGI:xbdgVsoIDzX3JtTMdiWvRKlu5I
Static task
static1
Behavioral task
behavioral1
Sample
2C3382E9EB5BBBFE86A88F9D8A75557C3F60707AF088C.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2C3382E9EB5BBBFE86A88F9D8A75557C3F60707AF088C.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.244/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
redline
install123
185.204.109.42:80
Extracted
redline
medianew
91.121.67.60:62102
Extracted
vidar
40.6
706
https://dimonbk83.tumblr.com/
-
profile_id
706
Extracted
redline
ANI
45.142.215.47:27643
Targets
-
-
Target
2C3382E9EB5BBBFE86A88F9D8A75557C3F60707AF088C.exe
-
Size
7.0MB
-
MD5
4792058ffed5c341273deda070de0805
-
SHA1
3020acf6e6493d6387e60bdbb6a3d6d895c85726
-
SHA256
2c3382e9eb5bbbfe86a88f9d8a75557c3f60707af088ce5f1283ee7a33cc3fbf
-
SHA512
657247736889b952c133d1ecfeaf9a8dd11f794446c70ac075145bba439074004136419d158a22c392dd14baee0e6fb2895019082367f752d4d0c568c5fdb554
-
SSDEEP
196608:xXLUCgOYr1yYDb8Irpd6lT9smQeJtegm5diN4vQ4KQcubAGI:xbdgVsoIDzX3JtTMdiWvRKlu5I
-
Detect Fabookie payload
-
Detects Smokeloader packer
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Socelars payload
-
OnlyLogger payload
-
Vidar Stealer
-
XMRig Miner payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-