General

  • Target

    9aa8e640a659ffe47ed3665ac11482b0

  • Size

    2.9MB

  • Sample

    240214-d6hhbafh4y

  • MD5

    9aa8e640a659ffe47ed3665ac11482b0

  • SHA1

    da0ad6136c04c616f814ed4a6638972fe7821955

  • SHA256

    06be4fd28372a6476533130d18bb309666c3e3601dd037b3b7e8795a1c791a74

  • SHA512

    56cc641bb4d4457a8b718ee1f2ffd282f2f41d5147365652448ad43b29823b7843c5d9098cd64d1512471f54be2a62e62144113a9214254f595a59d9332be2ac

  • SSDEEP

    49152:xcBpEwJ84vLRaBtIl9mVOwOBbJxpZpKEy7a+p0wnRKAQmM/84+cPzkot0zaHuk:xXCvLUBsgtOBbJ37KEyO+p0ah39TGk/+

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

rc4.i32
rc4.i32

Targets

    • Target

      9aa8e640a659ffe47ed3665ac11482b0

    • Size

      2.9MB

    • MD5

      9aa8e640a659ffe47ed3665ac11482b0

    • SHA1

      da0ad6136c04c616f814ed4a6638972fe7821955

    • SHA256

      06be4fd28372a6476533130d18bb309666c3e3601dd037b3b7e8795a1c791a74

    • SHA512

      56cc641bb4d4457a8b718ee1f2ffd282f2f41d5147365652448ad43b29823b7843c5d9098cd64d1512471f54be2a62e62144113a9214254f595a59d9332be2ac

    • SSDEEP

      49152:xcBpEwJ84vLRaBtIl9mVOwOBbJxpZpKEy7a+p0wnRKAQmM/84+cPzkot0zaHuk:xXCvLUBsgtOBbJ37KEyO+p0ah39TGk/+

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks