General
-
Target
Setup Virus.zip
-
Size
5.6MB
-
Sample
231013-1zzjkscf5v
-
MD5
f28c248eee341079a3b8b1d6b3c6d69f
-
SHA1
b38bc018c9b1271c7fd1b080e4fc9e21280f0796
-
SHA256
c736b51d529275f2d913f67ae5c5658bea675f2c5e8f3e20cc115e0500bc06cc
-
SHA512
53549aca5ba9579e3805ae2374a0a4988ad7b80b071672f07c92bd4fd88ed7dff709b94857caca2a5e7e6c95d29cda4ea70d48101427ac80cdab876def889549
-
SSDEEP
98304:jQrBbfoRhB9PNDGgr5TrD98alGby1bPkNrYYG+tuttQlv4q3fIvf2FEHaB2GYyMK:jQrtgRL9ZGm558wG+dctw2N4qyWEHaca
Static task
static1
Behavioral task
behavioral1
Sample
Setup Virus.zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Setup Virus.zip
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
Setup Virus.zip
Resource
win10v2004-20230915-en
Malware Config
Extracted
https://ndtpro.xyz/nj/config_40.ps1
Extracted
https://www.conectiva.pe/doc/config_40.ps1
Extracted
https://efeedor.com/blog/assets/config_40.ps1
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/sadew1013/
Extracted
smokeloader
pub3
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
-
url_path
....!..../software.php
....!..../software.php
Extracted
vidar
55.5
915
https://t.me/tg_turgay
https://ioc.exchange/@xiteb15011
-
profile_id
915
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
Setup Virus.zip
-
Size
5.6MB
-
MD5
f28c248eee341079a3b8b1d6b3c6d69f
-
SHA1
b38bc018c9b1271c7fd1b080e4fc9e21280f0796
-
SHA256
c736b51d529275f2d913f67ae5c5658bea675f2c5e8f3e20cc115e0500bc06cc
-
SHA512
53549aca5ba9579e3805ae2374a0a4988ad7b80b071672f07c92bd4fd88ed7dff709b94857caca2a5e7e6c95d29cda4ea70d48101427ac80cdab876def889549
-
SSDEEP
98304:jQrBbfoRhB9PNDGgr5TrD98alGby1bPkNrYYG+tuttQlv4q3fIvf2FEHaB2GYyMK:jQrtgRL9ZGm558wG+dctw2N4qyWEHaca
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Socelars payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-