General
-
Target
6706ad721d914_JuidePorison.exe
-
Size
8.6MB
-
Sample
241011-zqhzsstbpe
-
MD5
54e6bcf9be550a5b8e5cd7b83318942d
-
SHA1
0c9084c04d5dd833867a60376c0809e8276fd869
-
SHA256
b5eaf10fcee125295402478e086f6e3c441024daec47dde0170ba528525f1eb2
-
SHA512
afed87e898d00a146c42f4c81b86fe5c243c205fabb3296d757915bc427bfa8fe91d7cad48a4d36f427168b90011d8ce05e8b3003ccf47f0a3e3ab5151eefd1f
-
SSDEEP
196608:CkQm7e7eIqv9n2vYLIRQ6SSQCpX67SfUDTsmpfCcXe+8BvSk:CkQm7e7eIqvF2vRCApXVwTsmpfCcL8g
Static task
static1
Behavioral task
behavioral1
Sample
6706ad721d914_JuidePorison.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6706ad721d914_JuidePorison.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
6706ad721d914_JuidePorison.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
default
http://194.246.83.76
-
url_path
/a238cad009777d38.php
Extracted
vidar
11.1
b3f4e62dbdd6721134cbcb95ba248e90
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
stealc
default7_doz
http://62.204.41.176
-
url_path
/edd20096ecef326d.php
Extracted
https://my.cloudme.com/v1/ws2/:usefullbox/:real/real.txt
Targets
-
-
Target
6706ad721d914_JuidePorison.exe
-
Size
8.6MB
-
MD5
54e6bcf9be550a5b8e5cd7b83318942d
-
SHA1
0c9084c04d5dd833867a60376c0809e8276fd869
-
SHA256
b5eaf10fcee125295402478e086f6e3c441024daec47dde0170ba528525f1eb2
-
SHA512
afed87e898d00a146c42f4c81b86fe5c243c205fabb3296d757915bc427bfa8fe91d7cad48a4d36f427168b90011d8ce05e8b3003ccf47f0a3e3ab5151eefd1f
-
SSDEEP
196608:CkQm7e7eIqv9n2vYLIRQ6SSQCpX67SfUDTsmpfCcXe+8BvSk:CkQm7e7eIqvF2vRCApXVwTsmpfCcL8g
-
Detect Socks5Systemz Payload
-
Detect Vidar Stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4