General

  • Target

    1fbdb016aac5b8eaebe586344b630249932f776bdc8d589362bcf72653160737

  • Size

    7.5MB

  • Sample

    241105-nyefsszlgs

  • MD5

    e4a73613d8376de778c49b800428860f

  • SHA1

    b7ae8122e8559e25fcb4f2af9e8a16d0223936f3

  • SHA256

    1fbdb016aac5b8eaebe586344b630249932f776bdc8d589362bcf72653160737

  • SHA512

    753f2146b25ca85ccf8e497bef3458c3c0ff4361069a92ac6daf14b2d34649fe243fd6d7d4b9bda697f586186589d2982980cdb07dca95fc34366d0e62e55e43

  • SSDEEP

    196608:Jj7gqyaX1/rcwYspohv/7LZW7oXVL3mm5+yYiOriNljRXPJfTa9f83+Zv:V7gqyadIwYLv34+1mm5+DiDxPJfBOZv

Malware Config

Extracted

Family

privateloader

C2

http://45.133.1.107/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

51.178.186.149

Extracted

Family

socelars

C2

http://www.hhgenice.top/

Extracted

Family

redline

Botnet

media0421

C2

91.121.67.60:23325

Attributes
  • auth_value

    e37d5065561884bb54c8ed1baa6de446

Extracted

Family

redline

Botnet

user112

C2

135.181.129.119:4805

Attributes
  • auth_value

    b69102cdbd4afe2d3159f88fb6dac731

Extracted

Family

vidar

Version

47.9

Botnet

916

C2

https://mas.to/@kirpich

Attributes
  • profile_id

    916

Extracted

Family

gcleaner

C2

gcl-gb.biz

Extracted

Family

ffdroider

C2

http://111.90.158.95

Targets

    • Target

      4bbeb8107010859f1cf7483e6f673d52bed028eeaec5748104f1a4ff000a65a7

    • Size

      7.5MB

    • MD5

      0774bcec407caea2eb661738b09657fa

    • SHA1

      5bbb37189379bb762d8ea6334ddd58e86d2569fb

    • SHA256

      4bbeb8107010859f1cf7483e6f673d52bed028eeaec5748104f1a4ff000a65a7

    • SHA512

      1a56fa1afe5c51f7c88028adfdba4f104772ebe052bc03e7f5d78d5fd50aac8a2fe672a084b6eb06a8334258d3fb7ea4c22e08b6aa7d16f665744df85e15c2e4

    • SSDEEP

      196608:JCsD6yHg6X3yfE6Ti6T1xMUrNFIzaIfz/xR6Bq:JCs9g6XifEixdrDVWzD6A

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Ffdroider family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Onlylogger family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • OnlyLogger payload

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

    • Target

      setup_installer.exe

    • Size

      7.5MB

    • MD5

      c6676a495e25baecb81607b9ca6f2e35

    • SHA1

      c9d282a7d0f74ed6d1fa1f1c6f6e1bd40659da1b

    • SHA256

      7a6039a1601878c14fbeb77ca29fca60e75058154a6c9442c7924f60aa18bd40

    • SHA512

      381ef561bbfd8b16d9e90fc3f28407940dd1a1750337a64e6638e2e1244170d5ea4d98c6e28dbd6de0618852a6466c5a68bfb83c7e055a946661ea2869d14583

    • SSDEEP

      196608:xyLUCgmV7COjyF0WczKlJN5D2WXqGvSMl96eNxhaSIeuLr:xydg87CO+FVczKhl3Zd1aSIeI

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Ffdroider family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • Onlylogger family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • OnlyLogger payload

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks