General

  • Target

    1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe

  • Size

    3.2MB

  • Sample

    240107-w2h76aceg9

  • MD5

    f23a2c6dfaeceefb067b42df7b09c2e5

  • SHA1

    77f744dc208d542f438bae3dc97398c769dffc90

  • SHA256

    1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2

  • SHA512

    9020004b0b77aaf9ee6b6429763c19b7a2360ee06835cb5bed9a1b724241752ac5f1c9013346bf8971d6dd217495e71b59ee423830e13f3c9dc1bdb6cced6028

  • SSDEEP

    98304:xQCvLUBsgjDAzKDFW/1+Y6MojWEpww/CPJs:xtLUCg4QFi/olpww/CRs

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

vidar

Version

40.3

Botnet

706

C2

https://lenko349.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

pab777

C2

185.215.113.15:6043

Targets

    • Target

      1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe

    • Size

      3.2MB

    • MD5

      f23a2c6dfaeceefb067b42df7b09c2e5

    • SHA1

      77f744dc208d542f438bae3dc97398c769dffc90

    • SHA256

      1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2

    • SHA512

      9020004b0b77aaf9ee6b6429763c19b7a2360ee06835cb5bed9a1b724241752ac5f1c9013346bf8971d6dd217495e71b59ee423830e13f3c9dc1bdb6cced6028

    • SSDEEP

      98304:xQCvLUBsgjDAzKDFW/1+Y6MojWEpww/CPJs:xtLUCg4QFi/olpww/CRs

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks