General
-
Target
700867b5fa6090f82471905c08e3290e
-
Size
3.9MB
-
Sample
240123-tzgkfadaa5
-
MD5
700867b5fa6090f82471905c08e3290e
-
SHA1
dccf44baea80b22d047e5995948e213b98bb19b2
-
SHA256
ba0da6a3639ca5192cc50b70f1b9e5bb86be36a53a8b1cfacf3f5f35d2ab5c0b
-
SHA512
26c4b81a2dc91dc310c3c747a8304991de8c6a1e8c79fa6313222301c4d178a88b3eb73d7046001df914da390eb88bc1eff827322dd0cf26a2706464548059ec
-
SSDEEP
98304:xJCvLUBsgiT5ZOPV+7ePBTZRH9K3cDtyANhpiGWe2zrs:xiLUCgiTuVf7DKsDV3pi1s
Static task
static1
Behavioral task
behavioral1
Sample
700867b5fa6090f82471905c08e3290e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
700867b5fa6090f82471905c08e3290e.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
nullmixer
http://sornx.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.171/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.185
Extracted
smokeloader
pub6
Extracted
redline
pab3
185.215.113.15:61506
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knurxh28.top
moraku02.top
-
payload_url
http://sargym03.top/download.php?file=lv.exe
Targets
-
-
Target
700867b5fa6090f82471905c08e3290e
-
Size
3.9MB
-
MD5
700867b5fa6090f82471905c08e3290e
-
SHA1
dccf44baea80b22d047e5995948e213b98bb19b2
-
SHA256
ba0da6a3639ca5192cc50b70f1b9e5bb86be36a53a8b1cfacf3f5f35d2ab5c0b
-
SHA512
26c4b81a2dc91dc310c3c747a8304991de8c6a1e8c79fa6313222301c4d178a88b3eb73d7046001df914da390eb88bc1eff827322dd0cf26a2706464548059ec
-
SSDEEP
98304:xJCvLUBsgiT5ZOPV+7ePBTZRH9K3cDtyANhpiGWe2zrs:xiLUCgiTuVf7DKsDV3pi1s
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1