General

  • Target

    7ad3394946993cd87a845bf6c4773eb1e05b1565fd240d686a58566e0be094ed

  • Size

    2.9MB

  • Sample

    241110-c8vpzs1kcp

  • MD5

    640170d7f6e4e263522412d715882ebe

  • SHA1

    8602b54d144a2c6d45145b3b4499da96b56abbe5

  • SHA256

    7ad3394946993cd87a845bf6c4773eb1e05b1565fd240d686a58566e0be094ed

  • SHA512

    757f8315474c89e4d8561328ff23325f11889025c584dd4628ee97ff818d94c93ca00d7c570eb6e88e4373a98dd0f9bda8100eb297a2e6e72dd39b9f46c7d058

  • SSDEEP

    49152:EyI3LgFRrQ9lOolODTqkxTNn0nfyfGjq1vFoC5WeLT6uZXapTa6+yFA:0308OolODThR0n6uufn6UcT2

Malware Config

Extracted

Family

nullmixer

C2

http://razino.xyz/

Extracted

Family

redline

Botnet

Ani

C2

detuyaluro.xyz:80

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

vidar

Version

39.4

Botnet

933

C2

https://sergeevih43.tumblr.com/

Attributes
  • profile_id

    933

Targets

    • Target

      aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536

    • Size

      2.9MB

    • MD5

      99ef63ade7acea38cd4053c5b69d61e0

    • SHA1

      a201c10fcdfb902ae87a7817179ecb84a6b50a90

    • SHA256

      aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536

    • SHA512

      01dd32dbc173fe549f2c087fe0e98394afe3e044bc10e96efb431ad6d43d37a0155e62b0516b689c0fdbf00d9fed09d792b4d9b8f01ab6a41ea118d3d9b01c6c

    • SSDEEP

      49152:xcBlPkZVi7iKiF8cUvFyPOrQC914+sM7tO0r/JnTMsEwJ84vLRaBtIl9mTNYP8Z+:xNri7ixZUvFyPOx4O/xw7CvLUBsKFZ+

    • Modifies Windows Defender Real-time Protection settings

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks