General
-
Target
8d67e92d16bcb3f33a3114e14474fa58.bin
-
Size
4.2MB
-
Sample
240205-cgsrbaaadj
-
MD5
8d67e92d16bcb3f33a3114e14474fa58
-
SHA1
f3d0417dc639ca4fd7a22c07fb9dd3f5bd6cdc01
-
SHA256
23d27e3d7908bb0d08b3575d443036dc91aa2c390b170e0e2d8c5ab0dc054078
-
SHA512
a2f12d64ae93942ea4bf5f80fc9cf75739f2e0877e01ce26a35c2e5398c5664efea99e0f84cd9a2ae1b27f511648c0957618d19a7eda3ba88f3bfb111baa6125
-
SSDEEP
98304:yAZS8sVrh+5/NqFq/0afVxWRy10WJtl+gZKnexVw5y/PoIpUpda:yANstA5/0FqrzdJKneN/P75
Static task
static1
Behavioral task
behavioral1
Sample
8d67e92d16bcb3f33a3114e14474fa58.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d67e92d16bcb3f33a3114e14474fa58.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
pub6
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knudqw18.top
morzku01.top
-
payload_url
http://saryek01.top/download.php?file=lv.exe
Targets
-
-
Target
8d67e92d16bcb3f33a3114e14474fa58.bin
-
Size
4.2MB
-
MD5
8d67e92d16bcb3f33a3114e14474fa58
-
SHA1
f3d0417dc639ca4fd7a22c07fb9dd3f5bd6cdc01
-
SHA256
23d27e3d7908bb0d08b3575d443036dc91aa2c390b170e0e2d8c5ab0dc054078
-
SHA512
a2f12d64ae93942ea4bf5f80fc9cf75739f2e0877e01ce26a35c2e5398c5664efea99e0f84cd9a2ae1b27f511648c0957618d19a7eda3ba88f3bfb111baa6125
-
SSDEEP
98304:yAZS8sVrh+5/NqFq/0afVxWRy10WJtl+gZKnexVw5y/PoIpUpda:yANstA5/0FqrzdJKneN/P75
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
setup_installer.exe
-
Size
4.2MB
-
MD5
788045d291dccd0c7bdf32e1d8e2ae51
-
SHA1
ceda27c0b8d08c34d131575557a5ba20e797bbd4
-
SHA256
5ad7bfb790fc652df60360024af60578790930bb78489aabf352eae3fff103fb
-
SHA512
c3a49a22d19d11afeff7af52bf6e290d150c7942de81c171a27685ec522b2757af181cdae4fc3bae97954966fff0eb4f9986838112e7ab25e7983178b706ce86
-
SSDEEP
98304:x2CvLUBsgj5x9GaxH9s8sKvdz0WV43wEdYUwGM:x/LUCgjb9lxHiCh0Wq3oz
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1