General
-
Target
07fc70e17fc81a62cce3afd89755eb174e090bb3c0f170ea23a55ac7cdda1820
-
Size
3.7MB
-
Sample
240319-xjd16abh99
-
MD5
496a327e9fd93b6db80bd14c4a719be3
-
SHA1
b190039a7587a94d6ebf96415bd7bcf5d632b28e
-
SHA256
07fc70e17fc81a62cce3afd89755eb174e090bb3c0f170ea23a55ac7cdda1820
-
SHA512
7573798146cd11bac90851aa3189c222af430e24c640181dee5b947b21d31b9f66daccd47bd05be78f33de726e1d8220329a32f0c59a7a3dccf92a357649294b
-
SSDEEP
98304:V4MqoEwrHPzQ3eASj+yn49pqF+JE/vhU4pVQ:pqOrHPzQ3kto4qKpK
Behavioral task
behavioral1
Sample
07fc70e17fc81a62cce3afd89755eb174e090bb3c0f170ea23a55ac7cdda1820.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.210
-
url_path
/f993692117a3fda2.php
Extracted
gcleaner
185.172.128.90
5.42.65.115
Extracted
vidar
8.4
473851422af56ec6b6c329e5cb4d622d
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
-
profile_id_v2
473851422af56ec6b6c329e5cb4d622d
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Extracted
vidar
8.4
4cf8d799a3641f9821e54be56c960e28
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
-
profile_id_v2
4cf8d799a3641f9821e54be56c960e28
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Extracted
smokeloader
pub3
Extracted
risepro
217.197.107.177:50500
193.233.132.74:58709
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Targets
-
-
Target
07fc70e17fc81a62cce3afd89755eb174e090bb3c0f170ea23a55ac7cdda1820
-
Size
3.7MB
-
MD5
496a327e9fd93b6db80bd14c4a719be3
-
SHA1
b190039a7587a94d6ebf96415bd7bcf5d632b28e
-
SHA256
07fc70e17fc81a62cce3afd89755eb174e090bb3c0f170ea23a55ac7cdda1820
-
SHA512
7573798146cd11bac90851aa3189c222af430e24c640181dee5b947b21d31b9f66daccd47bd05be78f33de726e1d8220329a32f0c59a7a3dccf92a357649294b
-
SSDEEP
98304:V4MqoEwrHPzQ3eASj+yn49pqF+JE/vhU4pVQ:pqOrHPzQ3kto4qKpK
-
Detect Vidar Stealer
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-