General
-
Target
7244224914ec43925ee9d7281e863cdb
-
Size
5.2MB
-
Sample
240124-pwgntaadgm
-
MD5
7244224914ec43925ee9d7281e863cdb
-
SHA1
16b1a51ff9009692177a3a73ef30f9a19b91dded
-
SHA256
c33789989d58fce9bbde8cdd23576c881b5ed0c329dce641567db6ad9f10a1ed
-
SHA512
a1b643eaf9d2c8e7a6eeb061eb8a22942cedbd71d1a45c2a8bad11a44dcd4936237b75d37f2a70a0f581c7966442ddc3925ec8ae18760d337e3de0fc1874d38e
-
SSDEEP
98304:yUsZpVV5etv2UpEsR4/iirdJoj1iiScW2LtboAclJTBsoGQ/6d+SKsF1n1SnFrtw:yUgVAv2fsR4airkigilhBLj/VsFN0nFa
Static task
static1
Behavioral task
behavioral1
Sample
7244224914ec43925ee9d7281e863cdb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7244224914ec43925ee9d7281e863cdb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20231215-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knuelc78.top
moreag07.top
-
payload_url
http://sarafc10.top/download.php?file=lv.exe
Extracted
redline
pub1
viacetequn.site:80
Targets
-
-
Target
7244224914ec43925ee9d7281e863cdb
-
Size
5.2MB
-
MD5
7244224914ec43925ee9d7281e863cdb
-
SHA1
16b1a51ff9009692177a3a73ef30f9a19b91dded
-
SHA256
c33789989d58fce9bbde8cdd23576c881b5ed0c329dce641567db6ad9f10a1ed
-
SHA512
a1b643eaf9d2c8e7a6eeb061eb8a22942cedbd71d1a45c2a8bad11a44dcd4936237b75d37f2a70a0f581c7966442ddc3925ec8ae18760d337e3de0fc1874d38e
-
SSDEEP
98304:yUsZpVV5etv2UpEsR4/iirdJoj1iiScW2LtboAclJTBsoGQ/6d+SKsF1n1SnFrtw:yUgVAv2fsR4airkigilhBLj/VsFN0nFa
-
CryptBot payload
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
setup_installer.exe
-
Size
5.2MB
-
MD5
52185d08fdcc8452577760cba1a8c9bf
-
SHA1
4865c1c006cb8647463093a5a99953a4dfc2f4d4
-
SHA256
04328f6c08f6c49f2e32b80285e1fb2c9c4849b53bbfd09b815c643b46f33f78
-
SHA512
37d8b9f699a630413716570770204bfc4699441d40e2caf376182d713a429078310555b04429bfaccc7906ade9332c3a704111e5597cd94a2ea85acafded55df
-
SSDEEP
98304:xfCvLUBsgPc9Owr3MRJV1057hNd0aGLHcwUc81ejgKaLrOtlgTZN0oK/zEQC:xsLUCgPEMRJVQFga4HcwUcEKtlVDLlC
-
CryptBot payload
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1