General
-
Target
0b174fea183b59e9fd82bbbf4d6ca51a
-
Size
3.9MB
-
Sample
231230-cjrxssgfen
-
MD5
0b174fea183b59e9fd82bbbf4d6ca51a
-
SHA1
d3a5217af89a4144b292798fe35b81981f16f640
-
SHA256
7e85e9eea33b5c3576d801f9206cba0132f81e569c31e0f76f0ba9229b50b083
-
SHA512
6359c2dd3d33a519831d05ec058e3caaba6de4be2911ad1e519412e04d1d1ec537b07add719f366b4fa6936187a3e10c268e307fceca5eaaaa7278198085cd75
-
SSDEEP
98304:xDCvLUBsgUtB/0xIOUg2im1HKHSCK85OXovU/FqL:x4LUCgQZ0mS2im1qSZaFUc
Static task
static1
Behavioral task
behavioral1
Sample
0b174fea183b59e9fd82bbbf4d6ca51a.exe
Resource
win7-20231215-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
39.3
706
https://bandakere.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Targets
-
-
Target
0b174fea183b59e9fd82bbbf4d6ca51a
-
Size
3.9MB
-
MD5
0b174fea183b59e9fd82bbbf4d6ca51a
-
SHA1
d3a5217af89a4144b292798fe35b81981f16f640
-
SHA256
7e85e9eea33b5c3576d801f9206cba0132f81e569c31e0f76f0ba9229b50b083
-
SHA512
6359c2dd3d33a519831d05ec058e3caaba6de4be2911ad1e519412e04d1d1ec537b07add719f366b4fa6936187a3e10c268e307fceca5eaaaa7278198085cd75
-
SSDEEP
98304:xDCvLUBsgUtB/0xIOUg2im1HKHSCK85OXovU/FqL:x4LUCgQZ0mS2im1qSZaFUc
-
Nirsoft
-
Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-