General
-
Target
213b4d4a3fa8742fd83229a8be042bb9
-
Size
4.3MB
-
Sample
231231-ahb4vadfh4
-
MD5
213b4d4a3fa8742fd83229a8be042bb9
-
SHA1
22a20207263c5f6aea6e2174fb4544714ddf4a32
-
SHA256
6e67e541d5801d97cb6fc3ec483b7b9dc302506c0f3a1ef0942ea3f7126e9e87
-
SHA512
ce420a54d1f319502aac71ffa6da7457eca4bf0be30b4c4d27ce0040205ecc62136f559d567362d277b1d3752d6bbc8756c9f919c2bd7b91ec78463920fee34d
-
SSDEEP
98304:yg14WrmAN+0luBsjjvyYc2duACqtp3K57aPkxAS3u6ItmYD:yRvAN+lsPvyYc2t5tFaaPeHk
Static task
static1
Behavioral task
behavioral1
Sample
213b4d4a3fa8742fd83229a8be042bb9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
213b4d4a3fa8742fd83229a8be042bb9.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
smokeloader
pub5
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
redline
pub1
viacetequn.site:80
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knuywu58.top
morjeo05.top
-
payload_url
http://sarefy07.top/download.php?file=lv.exe
Targets
-
-
Target
213b4d4a3fa8742fd83229a8be042bb9
-
Size
4.3MB
-
MD5
213b4d4a3fa8742fd83229a8be042bb9
-
SHA1
22a20207263c5f6aea6e2174fb4544714ddf4a32
-
SHA256
6e67e541d5801d97cb6fc3ec483b7b9dc302506c0f3a1ef0942ea3f7126e9e87
-
SHA512
ce420a54d1f319502aac71ffa6da7457eca4bf0be30b4c4d27ce0040205ecc62136f559d567362d277b1d3752d6bbc8756c9f919c2bd7b91ec78463920fee34d
-
SSDEEP
98304:yg14WrmAN+0luBsjjvyYc2duACqtp3K57aPkxAS3u6ItmYD:yRvAN+lsPvyYc2t5tFaaPeHk
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-