General
-
Target
3ca30a9870de93b1929ce9c02f647c1791acf70b6848f1c4f795b20cf25c1e45
-
Size
4.8MB
-
Sample
241104-xrq1paxrcm
-
MD5
a926e55a75896aa4c261156bf6609832
-
SHA1
5ace1ef3669e61a0b7ef8d5670f2f1d82173f29a
-
SHA256
3ca30a9870de93b1929ce9c02f647c1791acf70b6848f1c4f795b20cf25c1e45
-
SHA512
ab8fb2317f953004322e329296db5e8cc28d468d67f0361811e8826802ac4de2ef96053f3c3ac01c0e5ec1581d18fb28c2cb86fb02177a27733a1cbe94144c29
-
SSDEEP
98304:XjVMCkZR9+6CRFSXmDYGwqOzj0lzy1Bmy2Q/IhIRIY1Ev69RZzVTWdiH:GwjSYBYj09y/20mY17RZzV7
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://sornx.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
redline
pub1
viacetequn.site:80
Targets
-
-
Target
setup_x86_x64_install.exe
-
Size
4.8MB
-
MD5
af731b30910bac47cdd0974c662a490c
-
SHA1
243d8250836f5c3f14c6ef41a2c627728ebde372
-
SHA256
6df17c7749ef2051fe3e97d23958e277a4febcf48c0179a3ae2fff1b4038640f
-
SHA512
3ff71df7b4bf790e5598ae5e2bacdb325b6458c1a7f7b97ed585279edf96890b1d97394a7618878448e7621cd068f344608d418181ad719bfa0922ff7a9ecaab
-
SSDEEP
98304:yWN+wY/DEU5lsIopxgVcEn5tbb5CggBGyslZMwr4+Kc36gBo3rCWAb0WPIoR66L:yPwsDqpxgBn5t/4KXlZD4PGKhsJPIoEy
-
CryptBot payload
-
Cryptbot family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
setup_installer.exe
-
Size
4.8MB
-
MD5
ec02f21e9609989b9dc71c981be1b38d
-
SHA1
b06e15ef538626113b9a5cfbe70cb31480f2ca65
-
SHA256
ffb56fbf4fcddd75123912dc66dab62c57bb790bb3f66fbff5f247760755fd06
-
SHA512
20d8b49e3b770c92d084b319c6c1f0e4e643b42f0e9cb8b5d117344abce63607b30cbcdfb391ce7a82cf03aa0f4c20c419129d5394ecea4f40ed495bd3dbbd46
-
SSDEEP
98304:xyCvLUBsgTFOLElweJs9kAo4K25044DU6GxctGSswIm5W8Nneh:xDLUCgROol6kU0TGW3Leh
-
CryptBot payload
-
Cryptbot family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2