General
-
Target
00646821a7a4410e7e4dc44c57de03e59df39f82dd2cc435b00f3c35b7b80b9c
-
Size
2.8MB
-
Sample
241110-arvybavhkk
-
MD5
df21bec744b2d8d506ffaf3093e98e21
-
SHA1
935d3a9ac24a56149cc5893b8beef0d679f54fb7
-
SHA256
00646821a7a4410e7e4dc44c57de03e59df39f82dd2cc435b00f3c35b7b80b9c
-
SHA512
8d0fe8017ebcc965b41ab1006f1fbb208a7d5d9a188babf1fbe048a87fa5b7621b2f8abbbff22cde3cba5398054d88c8059ae1bb70ec8b6744fe3fe631715033
-
SSDEEP
49152:tygo166/fgpy+bYEAs5KWpKUg8lD8qSYILztphrZlMycUrbGH/vlrKcax87DW:KPnOVYELpbg8lDmHhr3IUr8/wxIW
Static task
static1
Behavioral task
behavioral1
Sample
446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe
Resource
win7-20240903-en
Malware Config
Extracted
nullmixer
http://sornx.xyz/
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
gcleaner
194.145.227.161
Targets
-
-
Target
446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766
-
Size
2.8MB
-
MD5
d66dc705a3856467500a3b14e69e418e
-
SHA1
e1ae164a5855f4a98ceaeddaf2fae952a178ec34
-
SHA256
446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766
-
SHA512
1b8b1dc3d3c1f8fc4e4a9e65079058cf4ae86990ac1efcd7e4104fe4dfc44161facef715469e3c99791e8cc6e29c88137e1ab56d8d12e83a8c35197e771d9a52
-
SSDEEP
49152:xcBhEwJ84vLRaBtIl9mVUDMp0dMCfL+YD/tXZVixqYVWcagyS+IEuvJEjIQhpHrx:xHCvLUBsgoAsq6tJVi5aXInvEjhBrRz
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
Socelars family
-
Socelars payload
-
Vidar family
-
OnlyLogger payload
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1