General
-
Target
1fbdb016aac5b8eaebe586344b630249932f776bdc8d589362bcf72653160737
-
Size
7.5MB
-
Sample
241105-nyefsszlgs
-
MD5
e4a73613d8376de778c49b800428860f
-
SHA1
b7ae8122e8559e25fcb4f2af9e8a16d0223936f3
-
SHA256
1fbdb016aac5b8eaebe586344b630249932f776bdc8d589362bcf72653160737
-
SHA512
753f2146b25ca85ccf8e497bef3458c3c0ff4361069a92ac6daf14b2d34649fe243fd6d7d4b9bda697f586186589d2982980cdb07dca95fc34366d0e62e55e43
-
SSDEEP
196608:Jj7gqyaX1/rcwYspohv/7LZW7oXVL3mm5+yYiOriNljRXPJfTa9f83+Zv:V7gqyadIwYLv34+1mm5+DiDxPJfBOZv
Static task
static1
Behavioral task
behavioral1
Sample
4bbeb8107010859f1cf7483e6f673d52bed028eeaec5748104f1a4ff000a65a7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4bbeb8107010859f1cf7483e6f673d52bed028eeaec5748104f1a4ff000a65a7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.hhgenice.top/
Extracted
redline
media0421
91.121.67.60:23325
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Extracted
redline
user112
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
vidar
47.9
916
https://mas.to/@kirpich
-
profile_id
916
Extracted
gcleaner
gcl-gb.biz
Extracted
ffdroider
http://111.90.158.95
Targets
-
-
Target
4bbeb8107010859f1cf7483e6f673d52bed028eeaec5748104f1a4ff000a65a7
-
Size
7.5MB
-
MD5
0774bcec407caea2eb661738b09657fa
-
SHA1
5bbb37189379bb762d8ea6334ddd58e86d2569fb
-
SHA256
4bbeb8107010859f1cf7483e6f673d52bed028eeaec5748104f1a4ff000a65a7
-
SHA512
1a56fa1afe5c51f7c88028adfdba4f104772ebe052bc03e7f5d78d5fd50aac8a2fe672a084b6eb06a8334258d3fb7ea4c22e08b6aa7d16f665744df85e15c2e4
-
SSDEEP
196608:JCsD6yHg6X3yfE6Ti6T1xMUrNFIzaIfz/xR6Bq:JCs9g6XifEixdrDVWzD6A
-
FFDroider payload
-
Ffdroider family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Socelars family
-
Socelars payload
-
Vidar family
-
OnlyLogger payload
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
7.5MB
-
MD5
c6676a495e25baecb81607b9ca6f2e35
-
SHA1
c9d282a7d0f74ed6d1fa1f1c6f6e1bd40659da1b
-
SHA256
7a6039a1601878c14fbeb77ca29fca60e75058154a6c9442c7924f60aa18bd40
-
SHA512
381ef561bbfd8b16d9e90fc3f28407940dd1a1750337a64e6638e2e1244170d5ea4d98c6e28dbd6de0618852a6466c5a68bfb83c7e055a946661ea2869d14583
-
SSDEEP
196608:xyLUCgmV7COjyF0WczKlJN5D2WXqGvSMl96eNxhaSIeuLr:xydg87CO+FVczKhl3Zd1aSIeI
-
FFDroider payload
-
Ffdroider family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Socelars family
-
Socelars payload
-
Vidar family
-
OnlyLogger payload
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1