General

  • Target

    a0e87c4b9483fae95f6f57946023d3e7

  • Size

    2.8MB

  • Sample

    240224-epwjaahe9z

  • MD5

    a0e87c4b9483fae95f6f57946023d3e7

  • SHA1

    993ab6ddf0f3dfa349ef7ad4e3a44d0fc2a15a0a

  • SHA256

    bb7dead4d3da28e16ef45d0019cd42bbd3c4e3454c3042867e7f64aee2439912

  • SHA512

    95979bbfb68d50223fa05e35a7fa6552a30889a07327347d8a6d03a80fc8d92bbcd4f7456431aceb7fc43acc784610d196e2d002baee9278c762e45852ee69b1

  • SSDEEP

    49152:EgGeCFEEIxWoH57jp49GfCZHw7DhSZ2eGIxy2FKVqrZix9zSlbtcUw5:JHCG+0Zja9sCZzZnGWdF+wZixpebeU8

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

vidar

Version

39.7

Botnet

706

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Targets

    • Target

      a0e87c4b9483fae95f6f57946023d3e7

    • Size

      2.8MB

    • MD5

      a0e87c4b9483fae95f6f57946023d3e7

    • SHA1

      993ab6ddf0f3dfa349ef7ad4e3a44d0fc2a15a0a

    • SHA256

      bb7dead4d3da28e16ef45d0019cd42bbd3c4e3454c3042867e7f64aee2439912

    • SHA512

      95979bbfb68d50223fa05e35a7fa6552a30889a07327347d8a6d03a80fc8d92bbcd4f7456431aceb7fc43acc784610d196e2d002baee9278c762e45852ee69b1

    • SSDEEP

      49152:EgGeCFEEIxWoH57jp49GfCZHw7DhSZ2eGIxy2FKVqrZix9zSlbtcUw5:JHCG+0Zja9sCZzZnGWdF+wZixpebeU8

    • Modifies Windows Defender Real-time Protection settings

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      setup_installer.exe

    • Size

      2.8MB

    • MD5

      02c6277e504d9a866d5231ccd1a9a9a3

    • SHA1

      4983d4cd846092f1ad74d0487ac43344fad2b871

    • SHA256

      ed4731a5db70262bddf7f3bff36baef176a14762244e30c5de463075d30a88a3

    • SHA512

      77770c937b0a1671e342a2c272afe30034dfe9008517baac0243d8b761a347d462df78e0bc99d9ba06afc1150e51dd625d0b340140c9a23c5f07318aef6d435b

    • SSDEEP

      49152:xcBevQts9l77feLIO0dHNVzul9juajV4HyN9KFDdYD2nz4LEwJ84vLRaBtIl9mT7:xjQknfeLIO0rVz+a0eHyN0q2znCvLUB9

    • Modifies Windows Defender Real-time Protection settings

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks