General
-
Target
HEUR-Trojan.Win32.Crypt.gen-cd53d44c68b4b58f8.exe
-
Size
2MB
-
Sample
230122-2pyd7sca2s
-
MD5
74231678f536a19b3016840f56b845c7
-
SHA1
a5645777558a7d5905e101e54d61b0c8c1120de3
-
SHA256
cd53d44c68b4b58f88aa945ca38dd18e0a66c3f0854f5868fbea4345f7819fb4
-
SHA512
4117ad2bcdca9104ca8a53df0f7de102509ba6eb264d025ab1facd7a7ca0c14a1c4dd17de130521c4169aaaaeb6e779579dcb16d63a58b77feebfdc32d983d1f
-
SSDEEP
49152:xcBNPkZVi7iKiF8cUvFyPITKyMZOf+BFkUTQktm3II/M01KEwJ84vLRaBtIl9mT9:xNri7ixZUvFyPIpbfwF1UjIn01hCvLU9
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.Crypt.gen-cd53d44c68b4b58f8.exe
Resource
win7-20220812-en
Malware Config
Extracted
nullmixer
http://sokiran.xyz/
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Targets
-
-
Target
HEUR-Trojan.Win32.Crypt.gen-cd53d44c68b4b58f8.exe
-
Size
2MB
-
MD5
74231678f536a19b3016840f56b845c7
-
SHA1
a5645777558a7d5905e101e54d61b0c8c1120de3
-
SHA256
cd53d44c68b4b58f88aa945ca38dd18e0a66c3f0854f5868fbea4345f7819fb4
-
SHA512
4117ad2bcdca9104ca8a53df0f7de102509ba6eb264d025ab1facd7a7ca0c14a1c4dd17de130521c4169aaaaeb6e779579dcb16d63a58b77feebfdc32d983d1f
-
SSDEEP
49152:xcBNPkZVi7iKiF8cUvFyPITKyMZOf+BFkUTQktm3II/M01KEwJ84vLRaBtIl9mT9:xNri7ixZUvFyPIpbfwF1UjIn01hCvLU9
-
Detect Fabookie payload
-
Detects Smokeloader packer
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Nirsoft
-
Vidar Stealer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-