General
-
Target
a7c903bb30f41066a670c09194a07955
-
Size
3.3MB
-
Sample
240227-a4cbqscc95
-
MD5
a7c903bb30f41066a670c09194a07955
-
SHA1
594ed4dc9e2a66c9e7bc147b779b40914ecff1bd
-
SHA256
321ad36cf8f20be8c53d060b3043706a58ba49c4c25c994c96d19932137838cb
-
SHA512
e81c7a1136b4943d9dd09f5e668ad9ca980913d994855278efa028a93ccc4264522b46d6145a958a4e27d5b06de140ef51de763d07e01228ba1ba351f301dff3
-
SSDEEP
98304:JOXanYNtzmnI/zxUzvLvn6hZppH2GtbyQjH1nemzR1Hc:Jhn+onxLnYZpF2G37t9c
Static task
static1
Behavioral task
behavioral1
Sample
a7c903bb30f41066a670c09194a07955.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a7c903bb30f41066a670c09194a07955.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
smokeloader
pub5
Extracted
redline
AniOLD
liezaphare.xyz:80
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
vidar
39.8
706
https://xeronxikxxx.tumblr.com/
-
profile_id
706
Targets
-
-
Target
a7c903bb30f41066a670c09194a07955
-
Size
3.3MB
-
MD5
a7c903bb30f41066a670c09194a07955
-
SHA1
594ed4dc9e2a66c9e7bc147b779b40914ecff1bd
-
SHA256
321ad36cf8f20be8c53d060b3043706a58ba49c4c25c994c96d19932137838cb
-
SHA512
e81c7a1136b4943d9dd09f5e668ad9ca980913d994855278efa028a93ccc4264522b46d6145a958a4e27d5b06de140ef51de763d07e01228ba1ba351f301dff3
-
SSDEEP
98304:JOXanYNtzmnI/zxUzvLvn6hZppH2GtbyQjH1nemzR1Hc:Jhn+onxLnYZpF2G37t9c
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
3.2MB
-
MD5
8138b1878af967b8faa5ae3339a29ab8
-
SHA1
a6e02d8d97ef8278d68972c810bf26cedc3a5bc1
-
SHA256
f456651ae6531c2a3a00277625c832ab58043212c27cb3f341ea6ddd10be0aa5
-
SHA512
61b44cdd2a20f1fa1898bb89eadb6a84a5053c034dd800a8cd3e4cffa9bd2ee852e51c41fc126c1198abce516cfb997d340715e172c5db5b4d94bfdafc1c5277
-
SSDEEP
98304:x8yPC41vuFKLfNnNXfnjHy90j31n3GAwCvLUBsKguQFcq:xlvuunfnjS90TBTNLUCK5QFcq
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1