General
-
Target
b111b18faad3cf644558f0a84ebea9b6
-
Size
3.3MB
-
Sample
240304-n2lpaahf5w
-
MD5
b111b18faad3cf644558f0a84ebea9b6
-
SHA1
0379f24a192e1819c070dca64d35b9d3fd67735c
-
SHA256
55b8c3a1997416f5c6c04663ef6f6bd2e1712ba24162f330ee31b3ec1c6864e9
-
SHA512
2ad6868dd61ab7683846eb5a418f826f55b18b55332b4f5bd2d9033588d0635d7cac6646df2e7e869bf7128fb7a102c75775db2b3da274fc30791dd8f15a926e
-
SSDEEP
98304:yIerf7geeTrrowTBsgay6LVIP45iL4abjao1D4Ztc:yIerf7geerowTBj14ObjtGZtc
Static task
static1
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
ffdroider
http://186.2.171.3
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
pub5
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Targets
-
-
Target
b111b18faad3cf644558f0a84ebea9b6
-
Size
3.3MB
-
MD5
b111b18faad3cf644558f0a84ebea9b6
-
SHA1
0379f24a192e1819c070dca64d35b9d3fd67735c
-
SHA256
55b8c3a1997416f5c6c04663ef6f6bd2e1712ba24162f330ee31b3ec1c6864e9
-
SHA512
2ad6868dd61ab7683846eb5a418f826f55b18b55332b4f5bd2d9033588d0635d7cac6646df2e7e869bf7128fb7a102c75775db2b3da274fc30791dd8f15a926e
-
SSDEEP
98304:yIerf7geeTrrowTBsgay6LVIP45iL4abjao1D4Ztc:yIerf7geerowTBj14ObjtGZtc
-
FFDroider payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Vidar Stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-