General

  • Target

    74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f.exe

  • Size

    5.5MB

  • Sample

    240107-w4eyhsbfhl

  • MD5

    ca08876db58056ad35cadc2afeb89ab7

  • SHA1

    e18efa556280140ff92048fa499d729aa4bce089

  • SHA256

    74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f

  • SHA512

    c801c8019c911e2e298907fb5ac116d635e4a6b7227db7547908653f7cd680c0ebf71dba3660b8bbc87cfe3df4f8c6fbc332f11cb719466d5b311e7a721bfa27

  • SSDEEP

    98304:y2LiUOaQ1oNz8sSe3KojrNy40wRLY6C8Bv7vUmLyXvemfq6g04erxIcCZ6:yG7IoiOKcrNQsVNh7XRmfqY4erLCM

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

vidar

Version

40.3

Botnet

706

C2

https://lenko349.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

pab777

C2

185.215.113.15:6043

Targets

    • Target

      74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f.exe

    • Size

      5.5MB

    • MD5

      ca08876db58056ad35cadc2afeb89ab7

    • SHA1

      e18efa556280140ff92048fa499d729aa4bce089

    • SHA256

      74bafd56c1fb3cdebf0a63de4ffb6f16dc1d5cee38e11ab0d2bc2614538da65f

    • SHA512

      c801c8019c911e2e298907fb5ac116d635e4a6b7227db7547908653f7cd680c0ebf71dba3660b8bbc87cfe3df4f8c6fbc332f11cb719466d5b311e7a721bfa27

    • SSDEEP

      98304:y2LiUOaQ1oNz8sSe3KojrNy40wRLY6C8Bv7vUmLyXvemfq6g04erxIcCZ6:yG7IoiOKcrNQsVNh7XRmfqY4erLCM

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks