General
-
Target
23b9f735f8bb2607ae05fec9b71dee60
-
Size
5.7MB
-
Sample
231231-cfv52sbbck
-
MD5
23b9f735f8bb2607ae05fec9b71dee60
-
SHA1
0c0209030161610fca6baba7ecb588da4029f6aa
-
SHA256
0df9cc018e5258e289ffea0bb4137ae6f0bc8fe85b48b544520c7dae95453f68
-
SHA512
3ea0a8c2157dfaa159e529785b2497da71c41f1d95f371b36f86ada8ca5c76cf02e858cfce6f1043b3f5c0b3f284b4a1f903b6fa6e05a29a1af4f5fc7c1cb322
-
SSDEEP
98304:y/Pu1T6mvtNC5BcF4qdYOkDPZoSa6VcCThT5U7Sg3KWOlsUEn99:y/6T6mrCbM42uDPza6CCT3/BsH9
Static task
static1
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
smokeloader
pub6
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Targets
-
-
Target
23b9f735f8bb2607ae05fec9b71dee60
-
Size
5.7MB
-
MD5
23b9f735f8bb2607ae05fec9b71dee60
-
SHA1
0c0209030161610fca6baba7ecb588da4029f6aa
-
SHA256
0df9cc018e5258e289ffea0bb4137ae6f0bc8fe85b48b544520c7dae95453f68
-
SHA512
3ea0a8c2157dfaa159e529785b2497da71c41f1d95f371b36f86ada8ca5c76cf02e858cfce6f1043b3f5c0b3f284b4a1f903b6fa6e05a29a1af4f5fc7c1cb322
-
SSDEEP
98304:y/Pu1T6mvtNC5BcF4qdYOkDPZoSa6VcCThT5U7Sg3KWOlsUEn99:y/6T6mrCbM42uDPza6CCT3/BsH9
-
Detect ZGRat V1
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Vidar Stealer
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-