General
-
Target
a0d966c2ff40b2f4d70f25d26b5b6a06
-
Size
5.1MB
-
Sample
231219-z2qh1sfhf7
-
MD5
a0d966c2ff40b2f4d70f25d26b5b6a06
-
SHA1
f7bfb05cadf646aa2076561321a28ea32ce3572f
-
SHA256
a3507dc0b236809b00d1e1b8481607e75b2085a6cfeebab4d50ba816502adb29
-
SHA512
e8e1fbe174f26eeed85fbf8b54b3336f0aec358ed220a18dc3c4ab284b943c8186445afac314c13a7024cb3ff989b38e7ebcb2df34afe7152ce964f4435c385c
-
SSDEEP
98304:xfCvLUBsg8jXjpoRK9ZuN6z0F0BQIAwwiyWfRw5v9H5zvyd/mfs:xsLUCgojpoRKW64SBLADiyWfRcv/LyNl
Static task
static1
Behavioral task
behavioral1
Sample
a0d966c2ff40b2f4d70f25d26b5b6a06.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a0d966c2ff40b2f4d70f25d26b5b6a06.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://45.133.1.182/proxies.txt
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
gcleaner
gcl-page.biz
194.145.227.161
Extracted
vidar
41
706
https://mas.to/@killern0
-
profile_id
706
Extracted
redline
jamesoldd
65.108.20.195:6774
Extracted
redline
media26
91.121.67.60:62102
Extracted
smokeloader
2020
http://govsurplusstore.com/upload/
http://best-forsale.com/upload/
http://chmxnautoparts.com/upload/
http://kwazone.com/upload/
Extracted
smokeloader
pub5
Extracted
redline
@StealFate
135.125.40.64:15456
Targets
-
-
Target
a0d966c2ff40b2f4d70f25d26b5b6a06
-
Size
5.1MB
-
MD5
a0d966c2ff40b2f4d70f25d26b5b6a06
-
SHA1
f7bfb05cadf646aa2076561321a28ea32ce3572f
-
SHA256
a3507dc0b236809b00d1e1b8481607e75b2085a6cfeebab4d50ba816502adb29
-
SHA512
e8e1fbe174f26eeed85fbf8b54b3336f0aec358ed220a18dc3c4ab284b943c8186445afac314c13a7024cb3ff989b38e7ebcb2df34afe7152ce964f4435c385c
-
SSDEEP
98304:xfCvLUBsg8jXjpoRK9ZuN6z0F0BQIAwwiyWfRw5v9H5zvyd/mfs:xsLUCgojpoRKW64SBLADiyWfRcv/LyNl
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Socelars payload
-
Looks for VirtualBox Guest Additions in registry
-
OnlyLogger payload
-
Vidar Stealer
-
Blocklisted process makes network request
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-