General
-
Target
E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.bin.zip
-
Size
2.5MB
-
Sample
230325-m9lhtacd47
-
MD5
9a5c8b3a747172885a05bab8422409a4
-
SHA1
1ca4fcf5863ceb87e7b2af0a8e183d59cd73d811
-
SHA256
e021ad04be2d697e5e800a74d0aeb124fc2eed72f0b112a4ca574dc5ed7bd5df
-
SHA512
a574d3786690afdc2fc6c30089bf7661e4e6c16961b532134945b7085330fc60bf85d6db8315aa0720c9b549589384ff8c6d3d4f5e6fe330211b1e577754eb72
-
SSDEEP
49152:0SzTmiiddljBpvOwIxoJIN99BfBNDkqVV32tDkw11Q4CH5bmpp4M32JS:0wodljjEp9VBCququ6H5SpGM324
Static task
static1
Behavioral task
behavioral1
Sample
E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.exe
Resource
win10-20230220-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
smokeloader
pub5
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Extracted
vidar
39.7
933
https://shpak125.tumblr.com/
-
profile_id
933
Targets
-
-
Target
E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.bin
-
Size
2.5MB
-
MD5
0b682a6f8bd47a562e84e3359400a89d
-
SHA1
07ef2f949e1cdbba996ded863cb21580292987fc
-
SHA256
e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded
-
SHA512
407e027b4c9a980e9b1a6d8f7dc5818a8e1ee75839de7125120daa68af8c0d65c499bac776cd09f9a4d5588ccb2e7dcef34a9256a698e7fd129dacd0223c4194
-
SSDEEP
49152:EgK4ulwaGABcgp2FFQNR7QW+hIw9/2mniPJz2bzm5sihPpK6ky4Me2H:JKZ+aGA3poAaH9umihB5siWtP2H
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-