General
-
Target
AppGate_3.rar
-
Size
6.1MB
-
Sample
240610-mxgdbsgg93
-
MD5
9568b301d38bd3fa10f65fb9fb56b96d
-
SHA1
7f1000c227585d8bc122182ce785960653051c62
-
SHA256
ef3b791caf3b6d690197d2ab9ffb04310e42f7a5a5744827325b2c2d241c25e0
-
SHA512
ff8cbecf3c224cdf0b01a9d4ce81525888e7ef9c09db0c2834ebbb814012442d18aac064ec0687b972bd081baf423caaa9fef70a5024e523b927c4f4bb9e7326
-
SSDEEP
196608:Fyi/km2ye6lT+hIYET0nnVhtYQmLHECOEKxbQ:Mq2L6RiIonokCOEz
Static task
static1
Behavioral task
behavioral1
Sample
AppGate_3.rar
Resource
win10-20240404-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.63:14707
Extracted
risepro
77.91.77.67:58709
Extracted
lumma
https://greetclassifytalk.shop/api
https://distincttangyflippan.shop/api
https://macabrecondfucews.shop/api
https://greentastellesqwm.shop/api
https://stickyyummyskiwffe.shop/api
https://sturdyregularrmsnhw.shop/api
Targets
-
-
Target
AppGate_3.rar
-
Size
6.1MB
-
MD5
9568b301d38bd3fa10f65fb9fb56b96d
-
SHA1
7f1000c227585d8bc122182ce785960653051c62
-
SHA256
ef3b791caf3b6d690197d2ab9ffb04310e42f7a5a5744827325b2c2d241c25e0
-
SHA512
ff8cbecf3c224cdf0b01a9d4ce81525888e7ef9c09db0c2834ebbb814012442d18aac064ec0687b972bd081baf423caaa9fef70a5024e523b927c4f4bb9e7326
-
SSDEEP
196608:Fyi/km2ye6lT+hIYET0nnVhtYQmLHECOEKxbQ:Mq2L6RiIonokCOEz
-
Detect Vidar Stealer
-
Modifies firewall policy service
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1