General
-
Target
5d6adaa6f556bb8d75e1a6a35cd50f09
-
Size
2.7MB
-
Sample
240115-smwyxsbba7
-
MD5
5d6adaa6f556bb8d75e1a6a35cd50f09
-
SHA1
c82621792167559c80b2e3ab6bc61ccda77ead41
-
SHA256
52b7284b1615a30f3e8e6049f2d3501efe88334fb837c10dc5e86881ae55a5b7
-
SHA512
eb3f1ad36e33fe7a147721f01d51a21da55cbfbf438f2ebb2be68a5464259abfed2d75901cac9a1d71ccc49444e41bd74139fa572a9a84b898ab9f7f576154ef
-
SSDEEP
49152:EgiZdTzC/FHvK1o3sbmcWBLBKE57H+Pd1L5yVQel4iAr6upOB+QIwN93ss5nsR6B:JM2wwcWBddxePd13e/2sB+mdss5sRa7
Static task
static1
Behavioral task
behavioral1
Sample
5d6adaa6f556bb8d75e1a6a35cd50f09.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d6adaa6f556bb8d75e1a6a35cd50f09.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
nullmixer
http://motiwa.xyz/
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Extracted
redline
Cana01
176.111.174.254:56328
Extracted
smokeloader
pub6
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Targets
-
-
Target
5d6adaa6f556bb8d75e1a6a35cd50f09
-
Size
2.7MB
-
MD5
5d6adaa6f556bb8d75e1a6a35cd50f09
-
SHA1
c82621792167559c80b2e3ab6bc61ccda77ead41
-
SHA256
52b7284b1615a30f3e8e6049f2d3501efe88334fb837c10dc5e86881ae55a5b7
-
SHA512
eb3f1ad36e33fe7a147721f01d51a21da55cbfbf438f2ebb2be68a5464259abfed2d75901cac9a1d71ccc49444e41bd74139fa572a9a84b898ab9f7f576154ef
-
SSDEEP
49152:EgiZdTzC/FHvK1o3sbmcWBLBKE57H+Pd1L5yVQel4iAr6upOB+QIwN93ss5nsR6B:JM2wwcWBddxePd13e/2sB+mdss5sRa7
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
2.7MB
-
MD5
1ff08be8f9a879188c1b75815f9fdbef
-
SHA1
48c482b54ba17aaa436e348d62b2ddba6855a729
-
SHA256
cbe35192c04f83d4d3b179a8c229047ade740aac3785e198cd0fdb00c2bf91e5
-
SHA512
1822768a8f8a8d65810f729f14032c5730bdbdeefa052d25d0a581fac47cd96c31437cf6c0885021fb21cf0a80572b04149f8f327d49a75aae2d5709a56d3313
-
SSDEEP
49152:xcBNPkZVi7iKiF8cUvFyPrj1v06CCt5hiVusOG1UuTfm2QaCHyCwEwJ84vLRaBtS:xlri7ixZUvFyPH7JifOSUuTfmtHCvLUq
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-