General
-
Target
d1eec7914a5ca2f3e3a0b4c3c4e557ef
-
Size
2.4MB
-
Sample
240317-1jh7nagg35
-
MD5
d1eec7914a5ca2f3e3a0b4c3c4e557ef
-
SHA1
f655fcf0e1ecf1a79a6c19d71fba9714611c1bef
-
SHA256
56e45f6af87cf8505b1d88360f14bf00bca7be5108db4d4283fab4605fca2482
-
SHA512
0f640a7649b2b3fadf2686f3fb0fb811bee25f6eeb7591909ba2671036ef933604166737dc74eb22c12851330c027124522a3deee5317f62873b77b7325f163d
-
SSDEEP
49152:9gTtVRY265B7HhR5V12uJ63B2ZOS7u0dpTLvvt0pzxNCoFWBusIpY34NK+y:yTtVOBrvh9J63M9iiNLv1I2oFWBuNpGt
Static task
static1
Behavioral task
behavioral1
Sample
d1eec7914a5ca2f3e3a0b4c3c4e557ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1eec7914a5ca2f3e3a0b4c3c4e557ef.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
smokeloader
pub5
Extracted
cryptbot
lysuht78.top
morisc07.top
-
payload_url
http://damysa10.top/download.php?file=lv.exe
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
redline
test1
185.215.113.15:61506
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Targets
-
-
Target
d1eec7914a5ca2f3e3a0b4c3c4e557ef
-
Size
2.4MB
-
MD5
d1eec7914a5ca2f3e3a0b4c3c4e557ef
-
SHA1
f655fcf0e1ecf1a79a6c19d71fba9714611c1bef
-
SHA256
56e45f6af87cf8505b1d88360f14bf00bca7be5108db4d4283fab4605fca2482
-
SHA512
0f640a7649b2b3fadf2686f3fb0fb811bee25f6eeb7591909ba2671036ef933604166737dc74eb22c12851330c027124522a3deee5317f62873b77b7325f163d
-
SSDEEP
49152:9gTtVRY265B7HhR5V12uJ63B2ZOS7u0dpTLvvt0pzxNCoFWBusIpY34NK+y:yTtVOBrvh9J63M9iiNLv1I2oFWBuNpGt
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
setup_installer.exe
-
Size
2.4MB
-
MD5
4f39071ae96bbe636085ff30b895d630
-
SHA1
e790358c6f84900a02e72ffc56158c29ace40619
-
SHA256
2990a3bec6a52f106787fbdcebd73ebe67bbb6d903ef9e7bfd3fa71f51988e1f
-
SHA512
f906bb6dc96dc53ccabc673d44e8ba1d5cffc092ec700958dc028b67aa1c37184895ac3bb8921c92a381dcc4d916d6e7b3ca41fce0ff9495e37cd4f9b1019716
-
SSDEEP
49152:xcB9EwJ84vLRaBtIl9mVAJz9viFFGu+TFGeTJhDVLkqosBUNs/fYZ0qN9M8/p:xXCvLUBsgSz8FFcFGAPVnosBUNGf7qnl
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-