General
-
Target
dd65b3d3254770a4a448222db48773c39bcd730126d6c65a1b9210ab3445020e
-
Size
9.6MB
-
Sample
241108-crnkcavrem
-
MD5
6bb8159211be5fe4079acb4d4c23edaa
-
SHA1
ec567d6d11faff719850b54fd96e837567cb0f6d
-
SHA256
dd65b3d3254770a4a448222db48773c39bcd730126d6c65a1b9210ab3445020e
-
SHA512
d791f7101e75719ca0dce338e36843d40098bc9194f0d0c93cfbb2f7be34b67b5165a952ec0d5af7de11b5e240ef2bc87d27c325360e82cd9d4c32deb20b4ff4
-
SSDEEP
196608:oJ50Q+ygkDTeaK28dqDN9o/T1fzpuyU6OvEVW+eRfYRiUc0qjRL:od+ygkDTe3pdqDN9o5rpDVW+0fYRiUc/
Static task
static1
Behavioral task
behavioral1
Sample
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://6245c31e064c3.com/
Extracted
smokeloader
pub3
Extracted
gcleaner
appwebstat.biz
ads-memory.biz
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/jhvre24/
Targets
-
-
Target
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497
-
Size
9.6MB
-
MD5
c869a2a9d6adbde8402790f7a884d8c9
-
SHA1
d5452604cb3819e95fd5b29361305ef2357079a2
-
SHA256
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497
-
SHA512
81e64fa0b7115c5e296cb2bb3d68142f16b9be5956bb5e3fa7c7264c0160e5b54c92d7c8ec9832cf69d82f7738eca52d756d46cd97fac99faa706db538cef700
-
SSDEEP
196608:xouA78MTdWfPVzDVk2YMENpDTnnYyZ7Ww5kK+sBdGZzKnWthSiDSTD:x/A7hTYfPVzBwpPnAw5gmnWtACI
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
Smokeloader family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1