General
-
Target
df4aec4fa5881cec4417c8f64ecb2107
-
Size
3.8MB
-
Sample
240326-qvqe1abd63
-
MD5
df4aec4fa5881cec4417c8f64ecb2107
-
SHA1
706a666d7431084ec1220cf4b9940f853e172e65
-
SHA256
a2f15b4e843483e292e4c2f29cdd09a87081d7f158c0e860c88b211b2ad0a348
-
SHA512
8e68493bed99680d6a44f90dd5927785c34a9ce2834b15264a76d04dba2d12f56877b7a4bc3a61f7e6623beee41eca4d775d7031dd8192cdf8b58527f61c9838
-
SSDEEP
98304:yL4PC/N63gXRF0FmjUKyea6OLjD0jbVhUyd4Gy:y08FZoKq6OPM54Gy
Static task
static1
Behavioral task
behavioral1
Sample
df4aec4fa5881cec4417c8f64ecb2107.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df4aec4fa5881cec4417c8f64ecb2107.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.171/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.185
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
pub5
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
pab4
185.215.113.15:61506
Extracted
cryptbot
knucsj38.top
mornui03.top
-
payload_url
http://sarpuk04.top/download.php?file=lv.exe
Targets
-
-
Target
df4aec4fa5881cec4417c8f64ecb2107
-
Size
3.8MB
-
MD5
df4aec4fa5881cec4417c8f64ecb2107
-
SHA1
706a666d7431084ec1220cf4b9940f853e172e65
-
SHA256
a2f15b4e843483e292e4c2f29cdd09a87081d7f158c0e860c88b211b2ad0a348
-
SHA512
8e68493bed99680d6a44f90dd5927785c34a9ce2834b15264a76d04dba2d12f56877b7a4bc3a61f7e6623beee41eca4d775d7031dd8192cdf8b58527f61c9838
-
SSDEEP
98304:yL4PC/N63gXRF0FmjUKyea6OLjD0jbVhUyd4Gy:y08FZoKq6OPM54Gy
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
setup_installer.exe
-
Size
3.8MB
-
MD5
b54dc8e807ef2ab8b1ea4f2977d030dc
-
SHA1
4ed1449a168cd87f0ecf7c0ea03e626ee6d3b097
-
SHA256
4cb6232d5148b7f65da9f0cf4b67c85102ec799f717054d4c7130d98d577b466
-
SHA512
5e3577eebc5a734674bc32a1b2357d663abac599823141b6022b7b1ad2df97fe4f0ef3634aa258f989b77c47b6512c8d68e6bbf15fd3a55dc1c4a61d027bed95
-
SSDEEP
98304:xxCvLUBsgf4Zs3jEgYLGCBrhJRzP6UIhbnMsnv:xaLUCgf4KEgYLDViL5
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1