Resubmissions
11-11-2023 08:23
231111-j96bfacf5s 1008-11-2023 14:52
231108-r8x8facc5z 1027-10-2023 03:52
231027-ee6lhabh8x 1027-10-2023 03:51
231027-ee1p9abh8s 1025-10-2023 10:35
231025-mm3htagf6y 1023-10-2023 09:11
231023-k5l8fahc84 1021-10-2023 11:53
231021-n2kf8aga32 1021-10-2023 11:26
231021-njywwsfg64 1020-10-2023 21:27
231020-1a8qysbe9t 10General
-
Target
a.exe
-
Size
5KB
-
Sample
230624-2s7gaade5y
-
MD5
800a6337b0b38274efe64875d15f70c5
-
SHA1
6b0858c5f9a2e2b5980aac05749e3d6664a60870
-
SHA256
76a7490d3f1b0685f60a417d1c9cf96927b473825a914221f092f82ea112b571
-
SHA512
bf337140044a4674d69f7a2db30389e248593a99826c8731bc0a5ac71e46819eb539d8c7cbeab48108310359f5604e02e3bd64f17d9fdd380b574f329543645e
-
SSDEEP
48:6O/tGt28lK9iqmcfaFXfkeLJhyPFlWa8tYb/INV/cpwOulavTqXSfbNtm:j/IUiqtaJkeqDUt5xcpmsvNzNt
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
https://sungeomatics.com/css/colors/debug2.ps1
Extracted
Protocol: smtp- Host:
smtpm.csloxinfo.com - Port:
587 - Username:
[email protected] - Password:
Smr20007
Extracted
amadey
3.84
109.206.241.33/9bDc8sQ/index.php
Extracted
amadey
3.83
45.9.74.80/0bjdn2Z/index.php
Extracted
formbook
4.1
k2l0
thaomocquysonla.click
everblue-scr.com
yifangwuliu.top
zmrwe.buzz
xiaodong6.xyz
apartmentsforrent-gb-tok.bond
mtproductions.xyz
yattaya.com
thetastyfoodguide.com
gulfcoastclubfishing.com
capitalrepros.com
sonetpl.com
amenallelulia.com
shafanavn.com
1ywab.com
getflooringservices.today
quanhuipeng.com
tinytribecollective.com
mollyandpat.com
280175053.xyz
soundpopaudio.com
alltiett.net
sanctuary-for-the-arts.com
atsttoneworks.com
pueblo.app
32qtp.live
aowpce.site
dileijiancai.com
lunggear.com
asouthpacificmemoir.com
ab-hy22.xyz
colineverall.com
cetmetalprefabrik.com
baksis.press
mvpssweepstakes.com
mobilemoneyvideo.com
bobrik-elektro.com
snynlim.store
ezkiosystem.com
ariannabdance.com
villa-istanbul.com
worldassestsledger.com
usdrub.com
bloomingbliss.site
trwc.online
1xboro7.click
unforgettableai.com
tryfastleanpronow.online
sugarloved.com
turcomedical.com
a9hz.trade
scopegaming.com
zhujiangceramics.com
youonpurpose.coach
adhika.online
thevaultfinance.shop
hnmdzx.com
tameniee.xyz
aldimerencasa.com
nqwfnexufr.top
brawnyemail.site
copadconsulting.com
kidslikethat.com
scripturewraps.com
b8q9h.fun
Extracted
smokeloader
pub5
Extracted
formbook
4.1
sy18
mgn4.com
gemellebeauty.com
emj2x.top
melissamcduffee.com
holangman.top
cqmksw.com
pinax.info
u2sr03.shop
weighing.xyz
jetcasinosite-official6.top
xyz.ngo
suandoc.xyz
aboutwean.site
stockprob.com
bawdydesignz.com
buddybooster.net
scuderiaexotics.com
design-de-interiores.wiki
shipsmartstore.com
patricklloydrunning.com
centrelink.online
grav2.com
myctoclub.com
11elvnphotography.com
immersionbusiness.com
expressshoope.online
xvngitnsfbtjregw.xyz
15wpg.live
1hgfrdr.asia
mycravingscafe.com
123zap.net
zakhtive.com
futuretechsolutions.site
myhc360.com
terapiavisualaeronautica.com
klnaigptapp67.com
bjuice.vip
nanjingyunmi.work
inspiration-note.com
nuaar.com
nappenydelshop.com
tanglewoodbybci.com
goqyfriy.com
garderlafoi.com
drops-of-awesome.com
illuminatonightlyrental.com
moobileproctor.com
gracefulbeautycompany.com
futuretechpros.space
safeborderpetition.com
ltnmgt.com
recursiveinscription.com
homehealthcareoftampa.com
sarjanateknik.com
vonfidans.com
mmrmr.com
77121144.email
squallo.group
sigiprojects.com
swfpic.com
petfurevernz.com
financialfashionista.com
support-dsney.info
speakerbluetooth.com
dbszdjh.fun
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
smokeloader
pub1
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
a.exe
-
Size
5KB
-
MD5
800a6337b0b38274efe64875d15f70c5
-
SHA1
6b0858c5f9a2e2b5980aac05749e3d6664a60870
-
SHA256
76a7490d3f1b0685f60a417d1c9cf96927b473825a914221f092f82ea112b571
-
SHA512
bf337140044a4674d69f7a2db30389e248593a99826c8731bc0a5ac71e46819eb539d8c7cbeab48108310359f5604e02e3bd64f17d9fdd380b574f329543645e
-
SSDEEP
48:6O/tGt28lK9iqmcfaFXfkeLJhyPFlWa8tYb/INV/cpwOulavTqXSfbNtm:j/IUiqtaJkeqDUt5xcpmsvNzNt
-
Detect Fabookie payload
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Quasar payload
-
Raccoon Stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
StormKitty payload
-
Async RAT payload
-
Formbook payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-