General
-
Target
13397a15736988b52fe1634f0188f2252eeac130650a15385852a7d994eb3af9
-
Size
4.8MB
-
Sample
241106-wqpwkavhrj
-
MD5
796cb08e6353afeba19ab33f298960f9
-
SHA1
98046760a589b39ae194eb54dd9ed8b80e3f95ab
-
SHA256
13397a15736988b52fe1634f0188f2252eeac130650a15385852a7d994eb3af9
-
SHA512
a8509bd3cb705341d28512e9c4200a4ca2f1e218c6e89b370ebc627f2ab8088dd022025e5c06189bc2e87dcbe9d7082fdccd642e9ff62932775a0c628b571626
-
SSDEEP
98304:WYT3fEKrx9Re5Vr7tLj9M3lD1qT70dJMitdT8X+2YbbHIUV/DOTQ5rpLi:DTvEKrx9AVHN9ylDU70d2goUbRpe
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
redline
pub1
viacetequn.site:80
Targets
-
-
Target
setup_x86_x64_install.exe
-
Size
4.8MB
-
MD5
6dcd8a0c65183e2b3780b4a9f5b2f877
-
SHA1
53394a3f324a8118aefbe5d987abe687df0219ce
-
SHA256
03ad89ed671477f0890819c571f70cf954593eb08d0569808d9b14b545bcf526
-
SHA512
bdb16e82c8e169b64a5d6aa493099736668f96f88553b5ba7d41f641ac360bc4f4e84f311e92ff8c7e9b8f93da0bcce391fdcebc9dd80e1f007e021d959e9f17
-
SSDEEP
98304:ykDMVEoBsoJcNRJeEGZKHlBm3ch5E/cBiPvUjlTNEWB7szfduug:ycMVXB0RJeFKHDm3cc/c+sBDB7szfde
-
CryptBot payload
-
Cryptbot family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
setup_installer.exe
-
Size
4.7MB
-
MD5
739c9ff1236d3fafaa68d279f1b126b7
-
SHA1
0d27b4f313bb8d324776fcf067adebd3f9e8c53e
-
SHA256
36d452657a21c5477f387d83ab923e973a4e3ed8fa9a764741ca75040d725e4d
-
SHA512
e4c2c086e6f0b8aebe80c4cb484296f8f7de3f59379499d49004be35c9d80f6fab491b49d6ee8c1de4cacdf0979ca135a7811c2a85303fac977ed70691115c5e
-
SSDEEP
98304:xHCvLUBsgsl0Q4iU4TETmlVZSk4lswhMR25cWu0Yf20t8LFal3Q2/3lCjtl:xkLUCgvQ/l4/PiZ03LLwlBlm
-
CryptBot payload
-
Cryptbot family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2