General
-
Target
7ad3394946993cd87a845bf6c4773eb1e05b1565fd240d686a58566e0be094ed
-
Size
2.9MB
-
Sample
241110-c8vpzs1kcp
-
MD5
640170d7f6e4e263522412d715882ebe
-
SHA1
8602b54d144a2c6d45145b3b4499da96b56abbe5
-
SHA256
7ad3394946993cd87a845bf6c4773eb1e05b1565fd240d686a58566e0be094ed
-
SHA512
757f8315474c89e4d8561328ff23325f11889025c584dd4628ee97ff818d94c93ca00d7c570eb6e88e4373a98dd0f9bda8100eb297a2e6e72dd39b9f46c7d058
-
SSDEEP
49152:EyI3LgFRrQ9lOolODTqkxTNn0nfyfGjq1vFoC5WeLT6uZXapTa6+yFA:0308OolODThR0n6uufn6UcT2
Static task
static1
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
redline
Ani
detuyaluro.xyz:80
Extracted
redline
Cana
176.111.174.254:56328
Extracted
vidar
39.4
933
https://sergeevih43.tumblr.com/
-
profile_id
933
Targets
-
-
Target
aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536
-
Size
2.9MB
-
MD5
99ef63ade7acea38cd4053c5b69d61e0
-
SHA1
a201c10fcdfb902ae87a7817179ecb84a6b50a90
-
SHA256
aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536
-
SHA512
01dd32dbc173fe549f2c087fe0e98394afe3e044bc10e96efb431ad6d43d37a0155e62b0516b689c0fdbf00d9fed09d792b4d9b8f01ab6a41ea118d3d9b01c6c
-
SSDEEP
49152:xcBlPkZVi7iKiF8cUvFyPOrQC914+sM7tO0r/JnTMsEwJ84vLRaBtIl9mTNYP8Z+:xNri7ixZUvFyPOx4O/xw7CvLUBsKFZ+
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar family
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1