General
-
Target
7605052bbfa914b26d5cc12427c147b38965a836c8dbe59bf0e032dfb0b57891
-
Size
4.0MB
-
Sample
221028-tak7bsgecm
-
MD5
d2b3d51c1fe8072e70c1067a4856ceed
-
SHA1
a1e76eaacdedd1806784d5af8e32198717a60ddd
-
SHA256
7605052bbfa914b26d5cc12427c147b38965a836c8dbe59bf0e032dfb0b57891
-
SHA512
96a37fb0af3b60033816d24fcbd6330b393ec4b398411fa90437acd256129c0fbdc75afb4fd5b8fd7a8ea5aa8150ae157ca6f0e045c5c7fac20913ce426bf727
-
SSDEEP
98304:xjXxj+HYnb8BZ1jMwu3lMz2dU3YNTAf5HgCvLUBsK05:xjXxj+HYQBZ1jMwQs26YY59LUCK0
Static task
static1
Behavioral task
behavioral1
Sample
7605052bbfa914b26d5cc12427c147b38965a836c8dbe59bf0e032dfb0b57891.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7605052bbfa914b26d5cc12427c147b38965a836c8dbe59bf0e032dfb0b57891.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
redline
DomAni
ergerr3.top:80
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
7605052bbfa914b26d5cc12427c147b38965a836c8dbe59bf0e032dfb0b57891
-
Size
4.0MB
-
MD5
d2b3d51c1fe8072e70c1067a4856ceed
-
SHA1
a1e76eaacdedd1806784d5af8e32198717a60ddd
-
SHA256
7605052bbfa914b26d5cc12427c147b38965a836c8dbe59bf0e032dfb0b57891
-
SHA512
96a37fb0af3b60033816d24fcbd6330b393ec4b398411fa90437acd256129c0fbdc75afb4fd5b8fd7a8ea5aa8150ae157ca6f0e045c5c7fac20913ce426bf727
-
SSDEEP
98304:xjXxj+HYnb8BZ1jMwu3lMz2dU3YNTAf5HgCvLUBsK05:xjXxj+HYQBZ1jMwQs26YY59LUCK0
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Nirsoft
-
Creates new service(s)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-