General
-
Target
994b0bab7ff8444a2af843037db8ddb5
-
Size
4.3MB
-
Sample
240213-nfwmcshf68
-
MD5
994b0bab7ff8444a2af843037db8ddb5
-
SHA1
a0570a216c8503c416de8fdadf69aa8c8e20a447
-
SHA256
3b3af3c0c0ccff93c1f62d0e00a25e76b856392c604e209f93e987a7a913a727
-
SHA512
18992af4d7cc9a00c83a475c0d44064d7e75ffcb36eff3fd79905e201ced2fce0ffb07833f6d39497cb89c7af14401eb1e1f671c7a18cf5607e03c3af9eafb74
-
SSDEEP
98304:xsCvLUBsgVWV1isl2OuKtda5UimgQb8Q6uNQYZO:xxLUCgVU1io29KIUimb8Ru6t
Static task
static1
Behavioral task
behavioral1
Sample
994b0bab7ff8444a2af843037db8ddb5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
994b0bab7ff8444a2af843037db8ddb5.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knudqw18.top
morzku01.top
-
payload_url
http://saryek01.top/download.php?file=lv.exe
Extracted
redline
pab3
185.215.113.15:61506
Targets
-
-
Target
994b0bab7ff8444a2af843037db8ddb5
-
Size
4.3MB
-
MD5
994b0bab7ff8444a2af843037db8ddb5
-
SHA1
a0570a216c8503c416de8fdadf69aa8c8e20a447
-
SHA256
3b3af3c0c0ccff93c1f62d0e00a25e76b856392c604e209f93e987a7a913a727
-
SHA512
18992af4d7cc9a00c83a475c0d44064d7e75ffcb36eff3fd79905e201ced2fce0ffb07833f6d39497cb89c7af14401eb1e1f671c7a18cf5607e03c3af9eafb74
-
SSDEEP
98304:xsCvLUBsgVWV1isl2OuKtda5UimgQb8Q6uNQYZO:xxLUCgVU1io29KIUimb8Ru6t
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1