General
-
Target
d81801103db8099772e85deae68b43aaa7e894366ab55b819dc1f89d54e9823d
-
Size
5.7MB
-
Sample
241106-s364tsvpek
-
MD5
7e7e4c62d44e8f8280474a1b852eef49
-
SHA1
a9781422b5ff52ed54907821d506a70e650b1f72
-
SHA256
d81801103db8099772e85deae68b43aaa7e894366ab55b819dc1f89d54e9823d
-
SHA512
326d12f48aefbcff3e2ae2fbb3b6591e932e4650e8d20a0fe62dea49c1b5c529387b70b858e5c44d70ce96f28d52d07eea0f47a4d464a5b5b5845c95c3060443
-
SSDEEP
98304:Xh9UDVemKJcHCMlHhXYMS0xFMrA5g7PUwnJMvgT25tYZ6R+dCTZIYP6+2pp:XTWVebJeCMZaMV0V7PUkJ25VR+dCTaYw
Static task
static1
Behavioral task
behavioral1
Sample
main_setup_x86x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
main_setup_x86x64.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
redline
Cana
176.111.174.254:56328
Extracted
redline
Ani
detuyaluro.xyz:80
Targets
-
-
Target
main_setup_x86x64.exe
-
Size
5.7MB
-
MD5
d241c70e1db8676e48c9c02937b2a589
-
SHA1
45f2b455c72040798fd92801e28dd5c154be8e8b
-
SHA256
36a7bd10bbfbb3998773c4822e1813b4f4bfb33e65a008241c35116e19dae52c
-
SHA512
5b376da38f0361a672ac3ac4c1fe0ec66ed3642fb591ade7fe4f400f7ad3c1affe440a4b243d036e4e58ed131df43376ff5e2b6c1b733a43cf4e68dd752f7072
-
SSDEEP
98304:JEp59qaoFjCCtIJ89NG67vrPqTxSMcEeeZ6eDoPKXLcj:JEpKaoRw89kOrSTWLeDNXI
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
5.6MB
-
MD5
0de8943eeed1e068cfb1f8174eb4777b
-
SHA1
8c9616d1c945fbddfe2093f2bc50408f53e59c19
-
SHA256
8869188aa10bb2230b54eeaf867d45700c10f5eb2d2cf20139187cac10372231
-
SHA512
637a07bc552cd0b30b820c32c0ebdff3451b25b8b83bfd65d5e924f4b9ba20ca75af48d5dbe5f16344128dc915d5fd3efe010d0270baf98b044570624444cd1f
-
SSDEEP
98304:xI9eBSJ4cb13SCpPnmb+IVmK8Cnc1436M8qj8skXg1IPL+29CvLUBsK80:xI9e5cb15tnmCIgKHnc16aq1Kg1IPLzd
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1