General

  • Target

    bfdb06e19260107f468834d5601f7f295ca82b31966be48f856011d9dba1f5b7exe.exe

  • Size

    2.5MB

  • Sample

    240107-yhyjvadhc3

  • MD5

    66d13537ed49e50fb83673f7632c0e5e

  • SHA1

    dc3ac1f47fe9d06e847fcb0ddf26190add45b839

  • SHA256

    bfdb06e19260107f468834d5601f7f295ca82b31966be48f856011d9dba1f5b7

  • SHA512

    c7047b62d3d8313bd9eec725c310a635f452e57d21b5ae625ef7993620ffc7fbb503ac3dc5b9309fdf47704437a4126d35155f63697761888c36d399baca1064

  • SSDEEP

    49152:9gFBlMFeWIvkLRoj9xuL5daZ1MzvgQza2Mv14mkE2NHGBF2E8r1TAHzNxy8zX5FT:y3lMTrLujc5wjMzlzbAhr2hGAE8RsHHr

Malware Config

Extracted

Family

vidar

Version

40.4

Botnet

706

C2

https://romkaxarit.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

rc4.i32
rc4.i32

Extracted

Family

gozi

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Targets

    • Target

      bfdb06e19260107f468834d5601f7f295ca82b31966be48f856011d9dba1f5b7exe.exe

    • Size

      2.5MB

    • MD5

      66d13537ed49e50fb83673f7632c0e5e

    • SHA1

      dc3ac1f47fe9d06e847fcb0ddf26190add45b839

    • SHA256

      bfdb06e19260107f468834d5601f7f295ca82b31966be48f856011d9dba1f5b7

    • SHA512

      c7047b62d3d8313bd9eec725c310a635f452e57d21b5ae625ef7993620ffc7fbb503ac3dc5b9309fdf47704437a4126d35155f63697761888c36d399baca1064

    • SSDEEP

      49152:9gFBlMFeWIvkLRoj9xuL5daZ1MzvgQza2Mv14mkE2NHGBF2E8r1TAHzNxy8zX5FT:y3lMTrLujc5wjMzlzbAhr2hGAE8RsHHr

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks