General
-
Target
d1f5ab6925535de239ea9f865dc00567
-
Size
5.2MB
-
Sample
240317-23q72sag2x
-
MD5
d1f5ab6925535de239ea9f865dc00567
-
SHA1
183134c16067b16ce99c9a8d82ca129c612863ef
-
SHA256
987a2417a285a7e885e5acdd635d3e2dfa1cf00bb98b6a39fbc17bc7c3fb4993
-
SHA512
c050ef1219d8c1977a1f67e36bd1232c487502a77419567f8372081e3e04064a80822b3c46e1bc931b921bbf013722660b961e4e88f6c5bd44fbf2bf872fb153
-
SSDEEP
98304:xHCvLUBsgPc9Owr3MRJV1057hNd0ZkqAMUsy1X5rj8lXlWssUhndP3TsJQXtKOJe:xkLUCgPEMRJVQFgGIUNX5r4lUUhlTXti
Static task
static1
Behavioral task
behavioral1
Sample
d1f5ab6925535de239ea9f865dc00567.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d1f5ab6925535de239ea9f865dc00567.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
redline
pub1
viacetequn.site:80
Extracted
smokeloader
pub5
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knuelc78.top
moreag07.top
-
payload_url
http://sarafc10.top/download.php?file=lv.exe
Targets
-
-
Target
d1f5ab6925535de239ea9f865dc00567
-
Size
5.2MB
-
MD5
d1f5ab6925535de239ea9f865dc00567
-
SHA1
183134c16067b16ce99c9a8d82ca129c612863ef
-
SHA256
987a2417a285a7e885e5acdd635d3e2dfa1cf00bb98b6a39fbc17bc7c3fb4993
-
SHA512
c050ef1219d8c1977a1f67e36bd1232c487502a77419567f8372081e3e04064a80822b3c46e1bc931b921bbf013722660b961e4e88f6c5bd44fbf2bf872fb153
-
SSDEEP
98304:xHCvLUBsgPc9Owr3MRJV1057hNd0ZkqAMUsy1X5rj8lXlWssUhndP3TsJQXtKOJe:xkLUCgPEMRJVQFgGIUNX5r4lUUhlTXti
-
CryptBot payload
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1