General
-
Target
E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.exe
-
Size
2.5MB
-
Sample
230325-mymazacc89
-
MD5
0b682a6f8bd47a562e84e3359400a89d
-
SHA1
07ef2f949e1cdbba996ded863cb21580292987fc
-
SHA256
e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded
-
SHA512
407e027b4c9a980e9b1a6d8f7dc5818a8e1ee75839de7125120daa68af8c0d65c499bac776cd09f9a4d5588ccb2e7dcef34a9256a698e7fd129dacd0223c4194
-
SSDEEP
49152:EgK4ulwaGABcgp2FFQNR7QW+hIw9/2mniPJz2bzm5sihPpK6ky4Me2H:JKZ+aGA3poAaH9umihB5siWtP2H
Static task
static1
Behavioral task
behavioral1
Sample
E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.exe
Resource
win7-20230220-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
smokeloader
pub5
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Extracted
vidar
39.7
933
https://shpak125.tumblr.com/
-
profile_id
933
Targets
-
-
Target
E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.exe
-
Size
2.5MB
-
MD5
0b682a6f8bd47a562e84e3359400a89d
-
SHA1
07ef2f949e1cdbba996ded863cb21580292987fc
-
SHA256
e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded
-
SHA512
407e027b4c9a980e9b1a6d8f7dc5818a8e1ee75839de7125120daa68af8c0d65c499bac776cd09f9a4d5588ccb2e7dcef34a9256a698e7fd129dacd0223c4194
-
SSDEEP
49152:EgK4ulwaGABcgp2FFQNR7QW+hIw9/2mniPJz2bzm5sihPpK6ky4Me2H:JKZ+aGA3poAaH9umihB5siWtP2H
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-