General
-
Target
3d047ebfbd96b0eb4e406b962f90c9fa.zip
-
Size
2.5MB
-
Sample
240106-l4rxzaecf9
-
MD5
3d047ebfbd96b0eb4e406b962f90c9fa
-
SHA1
25dfde37e1fe43a8bcb502c3f59743b9a1e58c13
-
SHA256
62fa979c83782843225c7a0d0f0aa695bae2bf29df295a83d4d0eb071d56a61d
-
SHA512
97328284f33c6bdd2c274089d9e3f6d80d5423659df5b5dc51258188b33a46e01c0702770abe291627ace5581afcd645216c53c435706cf23c99d76ea740fd0d
-
SSDEEP
49152:e0gfluPmAiVjPXv5uHJ6aSATmeFRHmX2Z3OQ+RvDgF5/Qj4RjPl5:0YudPxwIaLVRG+3O9RUF5Qj41
Static task
static1
Behavioral task
behavioral1
Sample
x86_x64_setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
x86_x64_setup.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Targets
-
-
Target
x86_x64_setup.exe
-
Size
2.5MB
-
MD5
743e92349fa4e70b5d34bd9be733b41c
-
SHA1
a1b82c3d1be61ba56e448a819990584df70a2fb4
-
SHA256
486a9c9cdb67b95932d7e7deda2cdea44621c2b3f407f1206c1f3ce3766850ec
-
SHA512
753a6314fcfa83302062e08d5704411234e321ff3eaf14ed92964576229491448e6960569c35c135fced32a80bdb65657343c08b8b1227d742377917052f0db5
-
SSDEEP
49152:EgXyw1i3r1pIbtMja//3W6wNG3Ja0NDuYS5pwybSUZgBffTVSX:JXy3IbtMjalwy1N6YSnXZgB3Jq
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-