General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
Sample
240129-pcz12sahdn
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
4363463463464363463463463.exe
Resource
win11-20231215-en
Malware Config
Extracted
formbook
4.1
ce10
universalbowls.com
bp5.site
thiagokielingwebdesign.net
grapper.fun
grow-more.us
cqdh888.com
facthunter.app
cstars05.xyz
baumeagency.com
montevallotowing.top
joshtdownes.com
ampvit88.info
timelesscoutureclothing.com
stimuscle.com
uppervillekeyword.top
victoriabaltzer.com
laguindah.art
kiddieboost.com
santafekeyword.top
818experience.com
xn--8mr685f.xn--6qq986b3xl
topratedselection.beauty
pilgrim13.online
joshalley.com
hty1tqhm.top
endangerda.com
nursing-degrees-39640.bond
geogit.tech
auctionhouse275.com
primeprodeals.com
zkq8kor5.shop
onchainpayments.net
northstudiogt.com
hirr.site
quix.agency
nl-prod.com
waubaykeyword.top
saveourstreamliner.com
mesabae.com
glovegpt.com
evelethtowing.top
stcstage.live
nvvaconsulting.net
markusmartl.club
charmcokeyword.top
ravichandranc.net
prettyandslayedco.com
jakobwakolbinger.com
leveringtowing.top
qc8o.site
animasafe.com
kantoshopping.com
threein.live
mavvericklabs.com
8kdz0dcm9h.com
hd6385.com
daovertise.com
14whoduhw.top
5pfxcicm.com
xyg222.com
ebov33.com
bachatstorepk.com
pinkcosmeticscompany.com
kinoxe.xyz
curlioshop.com
Extracted
phorphiex
http://185.215.113.66/
0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b
THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto
1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6
qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL
LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX
rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH
ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH
t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn
bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd
bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg
bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE
Extracted
redline
@PixelsCloud
94.156.67.230:13781
Extracted
smokeloader
lab
Extracted
risepro
193.233.132.62:50500
Extracted
remcos
RemoteHost
hendersonk1.hopto.org:2404
henderson1.camdvr.org:2404
centplus1.serveftp.com:2404
harrywlike.ddns.net:2404
genekol.nsupdate.info:2404
harrywlike1.ddns.net:2404
hendersonk2022.hopto.org:2404
genekol1.nsupdate.info:2404
generem.camdvr.org:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
sonic.exe
-
copy_folder
yakkk
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
chrome
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
gsgjdwg-1J0WWM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
fuckuuuuu
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Extracted
redline
adel
62.233.51.177:14107
-
auth_value
6ba5b78fc0fccdad3cc87ea2ca866fc2
Extracted
amadey
4.12
http://185.172.128.19
-
install_dir
cd1f156d67
-
install_file
Utsysc.exe
-
strings_key
0dd3e5ee91b367c60c9e575983554b30
-
url_paths
/ghsdh39s/index.php
Extracted
smokeloader
pub1
Extracted
xworm
91.92.249.37:9049
aMtkXNimPlkESDx9
Extracted
formbook
4.1
he09
clhear.com
maythunguyen.com
xiongmaoaijia.com
kembangzadsloh.xyz
speedwagner.com
360bedroom.com
campereurorg.top
cwxg2.site
mcdlibre.live
globigprimecompanylimited.com
1707102023-stripe.com
xhfj5.site
mugiwaranousopp.xyz
texmasco.com
sc9999.net
lite.team
8xb898.com
cibecuetowing.top
mgplatinemlak.xyz
southwestharborkeyword.top
mil840.vip
mygovindexhtml.online
pepecasinofun.online
lindalilly.com
4da8.com
gladespringtowing.top
tinblaster.net
jpedwardscoaching.com
toursardegna.net
ngocchiluong.com
darringtontowing.top
oiuajh.xyz
nighvideos.com
15868.mom
blueblaze.app
escachifollad.store
credclub.shop
digitalfreedomhub.com
onemobileal.com
obqk8.site
kelownainsulationservices.com
skywatchnewsstores.com
neu-de-update.com
streamart.live
popla9001.com
theundraftd.com
claims.scot
bonk-token.com
iwoulddye4u.com
tenderherbschool.com
thegoodbeautypodcast.com
nahanttowing.top
moneyshift.store
relaxify.cloud
wjr3x0d.shop
churchsec.net
chromadentalclinic.com
kadeonline.com
frank-cazino.com
desixair.com
cftd4o5.com
ipodenergy.com
kravingsbykiersten.com
richmondvilletowing.top
fino-shop.store
Extracted
redline
@RLREBORN Cloud TG: @FATHEROFCARDERS)
141.95.211.148:46011
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
LiveTraffic
20.79.30.95:33223
Extracted
redline
2024
195.20.16.103:20440
Targets
-
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Score10/10formbookguloaderphorphiexxmrigzgratce10downloaderevasionloaderminerpersistenceratspywarestealertrojanupxwormdcratgluptebaredlineriseprosmokeloaderxworm@pixelscloudlabbackdoordropperinfostealeramadeyremcosadelpub1remotehosthe09bootkitdiscovery2024@rlreborn cloud tg: @fatherofcarders)livetrafficpyinstaller-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Glupteba payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Formbook payload
-
XMRig Miner payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
3Windows Service
3Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Scripting
1Modify Registry
1Pre-OS Boot
1Bootkit
1Hide Artifacts
1Hidden Files and Directories
1