General
-
Target
redlin.zip
-
Size
2.9MB
-
Sample
230123-ftaytabg34
-
MD5
20a918e8de8f6abc3f9ad5aaa0f8ab6b
-
SHA1
c73d97926e71d9577f8bf065a77abc82532a07af
-
SHA256
f0e385eb75d80979811cf12c9dec3899ef724d1fba94ee5cd314c22e2df07377
-
SHA512
a76522a9af082f49c9a6e3be9c2eae123d1e54e1e5408a189e3c55d6d47b91d1e169a0d5346c6f6a2f764e49bfd577dbdfa4809251a7b3373a0986d8104c4838
-
SSDEEP
49152:C3arM3rBXWHDMzpUSngO8nChuH3CPmTq8dbZY5/pDMZzEmiLnFSMckQ8Xa/ZGJqJ:garM7BSMzpyOmChuHSOTqsbZY5/tEpiE
Static task
static1
Behavioral task
behavioral1
Sample
cd53d44c68b4b58f88aa945ca38dd18e0a66c3f0854f5868fbea4345f7819fb4.exe
Resource
win7-20221111-en
Malware Config
Extracted
nullmixer
http://sokiran.xyz/
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Targets
-
-
Target
cd53d44c68b4b58f88aa945ca38dd18e0a66c3f0854f5868fbea4345f7819fb4.exe
-
Size
3.0MB
-
MD5
74231678f536a19b3016840f56b845c7
-
SHA1
a5645777558a7d5905e101e54d61b0c8c1120de3
-
SHA256
cd53d44c68b4b58f88aa945ca38dd18e0a66c3f0854f5868fbea4345f7819fb4
-
SHA512
4117ad2bcdca9104ca8a53df0f7de102509ba6eb264d025ab1facd7a7ca0c14a1c4dd17de130521c4169aaaaeb6e779579dcb16d63a58b77feebfdc32d983d1f
-
SSDEEP
49152:xcBNPkZVi7iKiF8cUvFyPITKyMZOf+BFkUTQktm3II/M01KEwJ84vLRaBtIl9mT9:xNri7ixZUvFyPIpbfwF1UjIn01hCvLU9
-
Detect Fabookie payload
-
Detects Smokeloader packer
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Nirsoft
-
Vidar Stealer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-