General
-
Target
941c7e39e8ea114465eadbd45aa709d55ad36ba551cbbf552e4c09b494a3a32d
-
Size
6MB
-
Sample
230215-s4hsmace76
-
MD5
f060ae52df530e3012843eb588d29ea1
-
SHA1
07794a4febd6bf211499ab664c2f392998efacd9
-
SHA256
941c7e39e8ea114465eadbd45aa709d55ad36ba551cbbf552e4c09b494a3a32d
-
SHA512
53b2547b7dc31003398a03a260e9ca2648f9b59ea0f09a428b115f4d5af35b67c980ced077a8200c994fa1ecf96250a392943b88c4cf01458297588479510026
-
SSDEEP
196608:JpDyWvcKmJTk5IlonwiySJlPdanxJpX4q:JpWudsT7WlyAlAXj
Static task
static1
Behavioral task
behavioral1
Sample
941c7e39e8ea114465eadbd45aa709d55ad36ba551cbbf552e4c09b494a3a32d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
941c7e39e8ea114465eadbd45aa709d55ad36ba551cbbf552e4c09b494a3a32d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
nullmixer
http://soniyamona.xyz/
Extracted
socelars
http://www.kvubgc.com/
Extracted
privateloader
http://212.193.30.45/proxies.txt
http://45.144.225.57/server.txt
http://wfsdragon.ru/api/setStats.php
2.56.59.42
Extracted
gcleaner
web-stat.biz
privatevolume.bi
Extracted
redline
v2user1
88.99.35.59:63020
-
auth_value
0cd1ad671efa88aa6b92a97334b72134
Extracted
redline
media1222new
92.255.57.115:59426
-
auth_value
e03b63bf6657eb72216c7f69d34524dd
Extracted
redline
2
193.203.203.82:23108
-
auth_value
52b37b8702d697840527fac8a6ac247d
Targets
-
-
Target
941c7e39e8ea114465eadbd45aa709d55ad36ba551cbbf552e4c09b494a3a32d
-
Size
6MB
-
MD5
f060ae52df530e3012843eb588d29ea1
-
SHA1
07794a4febd6bf211499ab664c2f392998efacd9
-
SHA256
941c7e39e8ea114465eadbd45aa709d55ad36ba551cbbf552e4c09b494a3a32d
-
SHA512
53b2547b7dc31003398a03a260e9ca2648f9b59ea0f09a428b115f4d5af35b67c980ced077a8200c994fa1ecf96250a392943b88c4cf01458297588479510026
-
SSDEEP
196608:JpDyWvcKmJTk5IlonwiySJlPdanxJpX4q:JpWudsT7WlyAlAXj
-
Detect Fabookie payload
-
Detects Smokeloader packer
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Socelars payload
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
OnlyLogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-