General
-
Target
dafa83d84b03fcfac9730d199c122b96
-
Size
3.0MB
-
Sample
240321-hp11jsea32
-
MD5
dafa83d84b03fcfac9730d199c122b96
-
SHA1
49f0f9a195c39023bd72414bdf907815a9a453d6
-
SHA256
1a263b2603212ff1e492d9e0c718f12601789e27eaaba9a7a7048b4080c08bcb
-
SHA512
a96b153b271b586d700e10ff512d053e8b6951d32b2f9fbf0175d55d923c37f775a1cb87ffc6e009d074de22d76992f066f014b4be7d5e96ad65ec0b7d5452d2
-
SSDEEP
49152:xcBff7zgcRFIMWab1+IjfHybCMFTBgITBaixfk0eW7Ox/iRzyulUEwJ84vLRaBtm:xc4cDLx0JDg2nf4Em/SzyWDCvLUBsKu
Static task
static1
Malware Config
Extracted
nullmixer
http://motiwa.xyz/
Extracted
smokeloader
pub6
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Targets
-
-
Target
dafa83d84b03fcfac9730d199c122b96
-
Size
3.0MB
-
MD5
dafa83d84b03fcfac9730d199c122b96
-
SHA1
49f0f9a195c39023bd72414bdf907815a9a453d6
-
SHA256
1a263b2603212ff1e492d9e0c718f12601789e27eaaba9a7a7048b4080c08bcb
-
SHA512
a96b153b271b586d700e10ff512d053e8b6951d32b2f9fbf0175d55d923c37f775a1cb87ffc6e009d074de22d76992f066f014b4be7d5e96ad65ec0b7d5452d2
-
SSDEEP
49152:xcBff7zgcRFIMWab1+IjfHybCMFTBgITBaixfk0eW7Ox/iRzyulUEwJ84vLRaBtm:xc4cDLx0JDg2nf4Em/SzyWDCvLUBsKu
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Nirsoft
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-