General

  • Target

    210353e2c687a7e1e94408ca27cf59fbbec44495d75a3e466ae528a1a33a53ea.exe

  • Size

    2.8MB

  • Sample

    240107-w5qfmsbgar

  • MD5

    e4af1c73101f2ab9f89d04a11986c58a

  • SHA1

    a6711c9fffe5f192d9e01445ad261ef74b601cfc

  • SHA256

    210353e2c687a7e1e94408ca27cf59fbbec44495d75a3e466ae528a1a33a53ea

  • SHA512

    7f7da803b90d7c2948421e4106edac91899d109adc19c6f264e899ba726e349609bbfdab5051dafcba255becbc3f418fcb0eca2e199f562f51105231c71cfb07

  • SSDEEP

    49152:xcB7EwJ84vLRaBtIl9mVUycpVTI1+ZjnN4zXH9kGhTeUUP07If+cgDU8e:xRCvLUBsgKxI1wjAXZaUUPEIf+fU8e

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Targets

    • Target

      210353e2c687a7e1e94408ca27cf59fbbec44495d75a3e466ae528a1a33a53ea.exe

    • Size

      2.8MB

    • MD5

      e4af1c73101f2ab9f89d04a11986c58a

    • SHA1

      a6711c9fffe5f192d9e01445ad261ef74b601cfc

    • SHA256

      210353e2c687a7e1e94408ca27cf59fbbec44495d75a3e466ae528a1a33a53ea

    • SHA512

      7f7da803b90d7c2948421e4106edac91899d109adc19c6f264e899ba726e349609bbfdab5051dafcba255becbc3f418fcb0eca2e199f562f51105231c71cfb07

    • SSDEEP

      49152:xcB7EwJ84vLRaBtIl9mVUycpVTI1+ZjnN4zXH9kGhTeUUP07If+cgDU8e:xRCvLUBsgKxI1wjAXZaUUPEIf+fU8e

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks