General
-
Target
xfer records serum keygen torrent.7z
-
Size
18.4MB
-
Sample
241005-qemn6stdpj
-
MD5
337d39d3aa82bb378411a92596f8ffcd
-
SHA1
0d80ea87ca04c55df8a0b8ed3299949af4e89232
-
SHA256
6db534df73067ec0c18d4c799ec9ccf4d81ab2242228fd4461018de6de6e300f
-
SHA512
53230a27f93293c1a4850dcba17211170f2e6110d70259deb05b4cce8a7a7d204a3935260b993f27ce06f87426f6de6575a384dfde3e3973e78b77c48fdbb525
-
SSDEEP
393216:Qn6Aq0hMDcqFIbr6GcThiJ7k8NfqXIX0Kf8hL5Vkw8mYJDLX:Qk0hMvy6vTw7k89EIEKf8hLm57
Static task
static1
Behavioral task
behavioral1
Sample
xfer records serum keygen torrent.exe
Resource
win10-20240611-es
Behavioral task
behavioral2
Sample
xfer records serum keygen torrent.exe
Resource
win7-20240903-es
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Extracted
stealc
default5_doz
http://62.204.41.159
-
url_path
/edd20096ecef326d.php
Extracted
vidar
http://proxy.johnmccrea.com/
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
lumma
https://spirittunek.store/api
https://mobbipenju.store/api
https://eaglepawnoy.store/api
https://dissapoiznw.store/api
https://studennotediw.store/api
https://bathdoomgaz.store/api
Targets
-
-
Target
xfer records serum keygen torrent.exe
-
Size
935.6MB
-
MD5
3a247d70b0db7627562a90391d99031b
-
SHA1
e0017adb569d4314c90942934c581f63a52f85cf
-
SHA256
027d2336d9e969aae1fb3228cd055bc2f0b69f4361d05b6540c9e5a86b29069e
-
SHA512
3193be8e03861cee101a26ad6370c3f94bbe66184d4c7d2887c61325a13de276370081e97d2e0757936535f92f8182672ede3eda741aca9fa34fb428fb5b4da3
-
SSDEEP
393216:SjSaYAb5S19bepoRonj+uMLhBRXVBO0sH7jSOoYLnJbi/S:SuNAQ188ZROBj
-
Detect Vidar Stealer
-
Modifies firewall policy service
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2