General
-
Target
8bcedc0e7fe6cfba64cf47e554b3648cf015eb04ef9d50e0308c5a9779087880
-
Size
3.9MB
-
Sample
241111-fnmenasnhs
-
MD5
9f2d00813d696d9932623bf4d857741f
-
SHA1
f831e72ba1d94af727720914a8c86411a281b4e7
-
SHA256
8bcedc0e7fe6cfba64cf47e554b3648cf015eb04ef9d50e0308c5a9779087880
-
SHA512
84e67f515c27efd8efd3c3a65f29909ac4cc8c71a41101258263121812a7be9ba7d4cb0fc32388c7adddd743d4d5f07678aa66cc49c8e4828f2aa327f026c956
-
SSDEEP
98304:gcwBfO+jw0IWa/Ey2752s4cI3bVvvF793abPnirHD1jk7Ybr:Tw1MrWO27Us4dvN793kPGGA
Static task
static1
Behavioral task
behavioral1
Sample
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
redline
she
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
redline
ANI
45.142.215.47:27643
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
gcleaner
ggg-cl.biz
45.9.20.13
Targets
-
-
Target
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5.exe
-
Size
3.9MB
-
MD5
99854fad01d4d709cb0f609463491ddf
-
SHA1
dad4de38bedd0dd97a7e76f1e78c60f5dc26c35f
-
SHA256
91c43b63ed3549c521e4166ab7358e29ce19f8087c9053a8c6b6e4f17ddeb4c5
-
SHA512
9f743e0d598be9563621f5547aae94324a21d5cf3ac6bd6055a8c5d01b49c2fcc7c3ae0d2c4f817a90bfe87c3feb359bc4b1f53433ca5678e6bdb895e5e8c3cd
-
SSDEEP
98304:J3yTpHIoJjZst0p/7xuJNT01cxHxFkrVFXggLUGypTLnoBcDYxkg:JQeoJjw0pmT01cxHGgILW7oC0kg
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
3.8MB
-
MD5
b968dfca2c74f26c008abffa22c74581
-
SHA1
160dc676ce1696daa20f3c2d56cf41d84481d628
-
SHA256
582bd655f491fe76a95b9c8900a3051d379dcbb86036f273b2a7bc6cdd928e9b
-
SHA512
8146433494d3150b8a0c47783bfe004a8f6503eb71ffc87c508b76342a864f10f9913918a9e0828cfd83634d054868f129e06e4eb3c989c88b1e6c15e1262881
-
SSDEEP
98304:xuCvLUBsgNljaa5vDFVkA2jYsVn3QWQjC78LF4EZCm:xnLUCgjaaDj2xFQhjCSHZCm
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1