General
-
Target
720ac82bbf6ae7c41ea0630be8a40710
-
Size
3.7MB
-
Sample
240124-mzd1zsgdh4
-
MD5
720ac82bbf6ae7c41ea0630be8a40710
-
SHA1
210b371d8c3d4e1bc3e913173207590ec41c7710
-
SHA256
5bbc833edf2e7c061fd34fe1aba85ff56746dbe0875eafcc945c264ac45193ae
-
SHA512
f7873235e0b9a68e1f411864117662c790c738b6e4b2af3453b57d271e29d6e0a073664df862cb82e259eb6a888a945104816ea39113f8c2841ccd955bb03c31
-
SSDEEP
49152:9gxFlcj5VXxQ4Ql8k5YPvMsv2T7zQiyBEGAgBiILY6kX6Xovi8pHPu8YiW1SQ845:yfUhOVYPTWQpPAOiIUne5sPukE9AtbsR
Static task
static1
Behavioral task
behavioral1
Sample
720ac82bbf6ae7c41ea0630be8a40710.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
720ac82bbf6ae7c41ea0630be8a40710.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
nullmixer
http://sornx.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
gcleaner
194.145.227.161
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
gozi
Targets
-
-
Target
720ac82bbf6ae7c41ea0630be8a40710
-
Size
3.7MB
-
MD5
720ac82bbf6ae7c41ea0630be8a40710
-
SHA1
210b371d8c3d4e1bc3e913173207590ec41c7710
-
SHA256
5bbc833edf2e7c061fd34fe1aba85ff56746dbe0875eafcc945c264ac45193ae
-
SHA512
f7873235e0b9a68e1f411864117662c790c738b6e4b2af3453b57d271e29d6e0a073664df862cb82e259eb6a888a945104816ea39113f8c2841ccd955bb03c31
-
SSDEEP
49152:9gxFlcj5VXxQ4Ql8k5YPvMsv2T7zQiyBEGAgBiILY6kX6Xovi8pHPu8YiW1SQ845:yfUhOVYPTWQpPAOiIUne5sPukE9AtbsR
-
Detect Fabookie payload
-
Modifies firewall policy service
-
Modifies security service
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
OnlyLogger payload
-
Vidar Stealer
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Looks for VMWare services registry key.
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
3.7MB
-
MD5
184a87b6c0950b2a03dab882d36c661c
-
SHA1
8121404e64b7affa682841b997bddc323de85b82
-
SHA256
62da5ae01c896c19893b4540a249b3c3d7d2523b06fe083583994469a91db8f9
-
SHA512
117b7b4e6fd1380d257027852e4cfab4f506cd5bf041c5b0fcaf4a9784a5e2cacdec1904b9e512e37e2d8f0c924f985b207640ca2e77f1ad37731dde47d32096
-
SSDEEP
98304:xRCvLUBsgEbZDBRTOQfEA8lWfii12HJ9z/7xuEeqnr:x6LUCgmZDzqQrvwHJFB7
-
Detect Fabookie payload
-
Modifies firewall policy service
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
OnlyLogger payload
-
Vidar Stealer
-
Looks for VMWare services registry key.
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Modify Registry
9Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1