General
-
Target
112bd06da5542a690c50f0f4583d68f13c26685f14166a158d161489b0a1c8c6
-
Size
3.6MB
-
Sample
241105-kzt14a1kdj
-
MD5
e4fc06b9b59771608c0fb65c9c324475
-
SHA1
3058bcc5e0349ae96b840e9a53f19eb5fa1920bc
-
SHA256
112bd06da5542a690c50f0f4583d68f13c26685f14166a158d161489b0a1c8c6
-
SHA512
26722dbc98c6a2170c446496bf1c5be6331a20675fcca8818e997a7ca0e25a264d34c89d04859e1cfbb22eca2afb60e05a90390b6a91fb8936d146efba310682
-
SSDEEP
98304:BUDO6HJ8dXgo0hMMprSOnNJFq5RrsNxi4T+zJW/k:Gi6MXtKMMprrj4Drsm4TCWM
Static task
static1
Behavioral task
behavioral1
Sample
x86_x64_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
x86_x64_setup.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
redline
NCanal01
pupdatastart.tech:80
pupdatastart.xyz:80
pupdatastar.store:80
Extracted
redline
Ani
yaklalau.xyz:80
Extracted
vidar
39.3
706
https://bandakere.tumblr.com/
-
profile_id
706
Targets
-
-
Target
x86_x64_setup
-
Size
3.6MB
-
MD5
d93af4a3acb5eb632658a632178db45c
-
SHA1
c9ead39a2366efd397210b1b31fbf17c36d5b26e
-
SHA256
3ffc5b261ff1c9283c427243b54dbe5f9af2b103702a0af6d8516a4bace91a07
-
SHA512
38726799fb981b5adb08a5312e2ae7ed3a330d02d965b1a4e218d3549baf1dfff20ff79e276f884ed195650fe27e26097e0fcaf81bd397535612b5932a46f0b8
-
SSDEEP
98304:JfuJqGRQt7yqwEYqw1IxgdOAExfU2Dv3BAWK+EY:JfgqCQt7jwkw1Ixg6Fv3GWzEY
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
3.6MB
-
MD5
a29be9e688d14557bb2c8d1bab72071a
-
SHA1
4f839d5d4bd6f098abe8f5bc64db2542b0e40798
-
SHA256
885c540ea597bed7e1d4b8fd3670bc66e821368ba0df789c53a5fd2cb96ed33f
-
SHA512
6779e16636d379032752571d1db35385b88d46d007d9fc6093ff9537e6a1fcb7ce5937a649f0f908535c1d0a295faeaa34a719503b1a346e8609b8e2da185e1e
-
SSDEEP
98304:xeAjQVzoqa0ivM1QlevQuyDDYCvLUBsKIvE4:xeAQVzRa3M1QlekZLUCK+E4
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2