Overview
overview
10Static
static
3Setup_x32_...0).exe
windows7-x64
10Setup_x32_...0).exe
windows10-2004-x64
10Setup_x32_...1).exe
windows7-x64
10Setup_x32_...1).exe
windows10-2004-x64
10Setup_x32_...2).exe
windows7-x64
10Setup_x32_...2).exe
windows10-2004-x64
10Setup_x32_...3).exe
windows7-x64
10Setup_x32_...3).exe
windows10-2004-x64
10Setup_x32_...4).exe
windows7-x64
10Setup_x32_...4).exe
windows10-2004-x64
10Setup_x32_...5).exe
windows7-x64
10Setup_x32_...5).exe
windows10-2004-x64
10Setup_x32_...6).exe
windows7-x64
10Setup_x32_...6).exe
windows10-2004-x64
10Setup_x32_...7).exe
windows7-x64
10Setup_x32_...7).exe
windows10-2004-x64
10Setup_x32_...8).exe
windows7-x64
10Setup_x32_...8).exe
windows10-2004-x64
10Setup_x32_...9).exe
windows7-x64
10Setup_x32_...9).exe
windows10-2004-x64
10Setup_x32_x64 (2).exe
windows7-x64
10Setup_x32_x64 (2).exe
windows10-2004-x64
10Setup_x32_...0).exe
windows7-x64
10Setup_x32_...0).exe
windows10-2004-x64
10Setup_x32_...1).exe
windows7-x64
10Setup_x32_...1).exe
windows10-2004-x64
10Setup_x32_...2).exe
windows7-x64
10Setup_x32_...2).exe
windows10-2004-x64
10Setup_x32_...3).exe
windows7-x64
10Setup_x32_...3).exe
windows10-2004-x64
10Setup_x32_...4).exe
windows7-x64
10Setup_x32_...4).exe
windows10-2004-x64
10General
-
Target
f5796455d38b281afea25911c9f97bf14bfdaaa0892a908fbe215f72ea59bb74
-
Size
209.0MB
-
Sample
241106-k5s1zsxekf
-
MD5
b5c6981fb9a2a56ad343d847ab5a94ae
-
SHA1
e826fa036f2be1deb846abda64b1a8f4a459e160
-
SHA256
f5796455d38b281afea25911c9f97bf14bfdaaa0892a908fbe215f72ea59bb74
-
SHA512
0dbf535c804897c53d550c4515adb8239987df7f487b9322dfddf29f84678f41045318c2cdd76ad64179ac973c0c6e1fe7a8483f48556488cf36f58c2d72f9d8
-
SSDEEP
3145728:IPbPNPRPLPGk+rk+Sk+Uk+ak+mk+Fk+Rk+7k+jk+wk+gk+Nk+hk+qk+mk+Nk+JkX:gz9xDX
Static task
static1
Behavioral task
behavioral1
Sample
Setup_x32_x64 (10).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup_x32_x64 (10).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Setup_x32_x64 (11).exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Setup_x32_x64 (11).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Setup_x32_x64 (12).exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Setup_x32_x64 (12).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Setup_x32_x64 (13).exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Setup_x32_x64 (13).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Setup_x32_x64 (14).exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Setup_x32_x64 (14).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Setup_x32_x64 (15).exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Setup_x32_x64 (15).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Setup_x32_x64 (16).exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Setup_x32_x64 (16).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Setup_x32_x64 (17).exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Setup_x32_x64 (17).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Setup_x32_x64 (18).exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Setup_x32_x64 (18).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Setup_x32_x64 (19).exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Setup_x32_x64 (19).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Setup_x32_x64 (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Setup_x32_x64 (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Setup_x32_x64 (20).exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Setup_x32_x64 (20).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Setup_x32_x64 (21).exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Setup_x32_x64 (21).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Setup_x32_x64 (22).exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Setup_x32_x64 (22).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Setup_x32_x64 (23).exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Setup_x32_x64 (23).exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.wygexde.xyz/
Extracted
ffdroider
http://101.36.107.74
Extracted
nullmixer
http://wxkeww.xyz/
Extracted
redline
Cana
176.111.174.254:56328
Extracted
redline
DomAni2
flestriche.xyz:80
Targets
-
-
Target
Setup_x32_x64 (10).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (11).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (12).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (13).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (14).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (15).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (16).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (17).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (18).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (19).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (2).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (20).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (21).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (22).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (23).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Setup_x32_x64 (24).exe
-
Size
6.7MB
-
MD5
9ed9d2543910e01707fad071b76e52a1
-
SHA1
95c7867404af5e2d8d93b145dc254816192ab640
-
SHA256
384b35bfb6d07dda3ea948bb9aa47a3024822ff40d21a13932381d6386643acc
-
SHA512
aa51f249f1e443fce520853c2295c88f14bdb57a8714500cfa027fbb11f6fefc3bc901ea91fbdb630b151a098d10ed6536ffd04a545a95957737d714fd18f176
-
SSDEEP
196608:UBK7xHBATdA8xsvku1c7ZG2SuLgsn2bMlCnahYF7pS0i2:N7rYpIs7ZpL2bM0KM5
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1