General
-
Target
a702ea4d44b0cd2e341503175f84b0d2
-
Size
4.7MB
-
Sample
240226-wvhytadb61
-
MD5
a702ea4d44b0cd2e341503175f84b0d2
-
SHA1
d150c401bec51556ccce1cbd3ec286a3cd529e62
-
SHA256
3549672c8de23efbeec55aeef7925d4bf778b4683252084e04c7ceb6a50b9393
-
SHA512
93ae58177375ac4e8fc06e8435fd3174eff6c67fab1ad3ea0e51fdcd35db2368ba69cd2a6e12c90c7f62a790ffb324b8af4215de7661f4f4feec22e0aaa623a6
-
SSDEEP
98304:xDCvLUBsgh8CP7qLdpIyyFPLvnRpzrtR7v7+LliHHtJA9vqI0:x4LUCgK/LHIyyRLnv5BylUA930
Static task
static1
Behavioral task
behavioral1
Sample
a702ea4d44b0cd2e341503175f84b0d2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a702ea4d44b0cd2e341503175f84b0d2.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
nullmixer
http://sornx.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
gcleaner
194.145.227.161
Targets
-
-
Target
a702ea4d44b0cd2e341503175f84b0d2
-
Size
4.7MB
-
MD5
a702ea4d44b0cd2e341503175f84b0d2
-
SHA1
d150c401bec51556ccce1cbd3ec286a3cd529e62
-
SHA256
3549672c8de23efbeec55aeef7925d4bf778b4683252084e04c7ceb6a50b9393
-
SHA512
93ae58177375ac4e8fc06e8435fd3174eff6c67fab1ad3ea0e51fdcd35db2368ba69cd2a6e12c90c7f62a790ffb324b8af4215de7661f4f4feec22e0aaa623a6
-
SSDEEP
98304:xDCvLUBsgh8CP7qLdpIyyFPLvnRpzrtR7v7+LliHHtJA9vqI0:x4LUCgK/LHIyyRLnv5BylUA930
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
OnlyLogger payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-