Overview
overview
10Static
static
107zS850A099...ed.exe
windows7-x64
37zS850A099...ed.exe
windows10-2004-x64
77zS850A099...1a.exe
windows7-x64
77zS850A099...1a.exe
windows10-2004-x64
77zS850A099...b7.exe
windows7-x64
107zS850A099...b7.exe
windows10-2004-x64
107zS850A099...5e.exe
windows7-x64
67zS850A099...5e.exe
windows10-2004-x64
67zS850A099...a0.exe
windows7-x64
107zS850A099...a0.exe
windows10-2004-x64
107zS850A099...95.exe
windows7-x64
87zS850A099...95.exe
windows10-2004-x64
77zS850A099...cb.exe
windows7-x64
107zS850A099...cb.exe
windows10-2004-x64
107zS850A099...58.exe
windows7-x64
107zS850A099...58.exe
windows10-2004-x64
107zS850A099...7f.exe
windows7-x64
107zS850A099...7f.exe
windows10-2004-x64
107zS850A099...32.exe
windows7-x64
107zS850A099...32.exe
windows10-2004-x64
107zS850A099...c3.exe
windows7-x64
97zS850A099...c3.exe
windows10-2004-x64
97zS850A099...e9.exe
windows7-x64
107zS850A099...e9.exe
windows10-2004-x64
107zS850A099...8c.exe
windows7-x64
37zS850A099...8c.exe
windows10-2004-x64
37zS850A099...8c.exe
windows7-x64
67zS850A099...8c.exe
windows10-2004-x64
67zS850A099...rl.dll
windows7-x64
37zS850A099...rl.dll
windows10-2004-x64
37zS850A099...pp.dll
windows7-x64
37zS850A099...pp.dll
windows10-2004-x64
3General
-
Target
16d60806f4c35b942db7e2b9ff0004d4771db020
-
Size
6.4MB
-
Sample
241111-g88dastnfz
-
MD5
1384f5282e8bb65c9a3e75b7d9fce5b0
-
SHA1
16d60806f4c35b942db7e2b9ff0004d4771db020
-
SHA256
f403e5db7055c16c5608a7c5c5e8d72541f88a83720b84f6ee2a8ed7212f75a8
-
SHA512
2de310d6b17c0ac135d313d344678600ce3f6a7c0d5c30bf9c45548057ce1c22a656020b1d79267200dc39627ddd98aeeaec217084a8b3ef3db9b6a16cb468eb
-
SSDEEP
196608:UghGNXvUq+4HXquT0/0Jw2kRw/2DHlGmC:9G1vUqXnIi/2JGmC
Behavioral task
behavioral1
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS850A099E/libcurl.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
7zS850A099E/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS850A099E/libcurlpp.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
7zS850A099E/libcurlpp.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
privateloader
http://212.193.30.45/proxies.txt
http://45.144.225.57/server.txt
http://wfsdragon.ru/api/setStats.php
2.56.59.42
Extracted
socelars
http://www.kvubgc.com/
Extracted
nullmixer
http://soniyamona.xyz/
Extracted
smokeloader
pub5
Extracted
gcleaner
web-stat.biz
privatevolume.bi
Extracted
redline
media17223
92.255.57.115:59426
-
auth_value
0b27ce2a5b396987135b2ec499c63068
Extracted
redline
v2user1
88.99.35.59:63020
-
auth_value
0cd1ad671efa88aa6b92a97334b72134
Extracted
smokeloader
pub3
Targets
-
-
Target
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
-
Size
312KB
-
MD5
e5a07be6c167ccf605ba9e6a0608e141
-
SHA1
d50547756f224ebaf38efc1b2e5134b6caa272ba
-
SHA256
449fb91c32af2d722f418ab4ee0747d0b7457ba69496b2d8f894e6045d69e1e4
-
SHA512
b66a844121bd42707aab3200f5e2a01765bd00ea3b958e09baeca9cd6856005a17474e72a9635184046d92205be3baf6677951fd8eb42ccebe687efb8b30f13b
-
SSDEEP
6144:vuCEpL0EsfKbmBn+ci4Hmbqt7QGJw4b1MEPE:vVfKaBn+ciImE7/Jw4eEPE
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
-
Size
381KB
-
MD5
996061fe21353bf63874579cc6c090cc
-
SHA1
eeaf5d66e0ff5e9ddad02653c5bf6af5275e47e9
-
SHA256
b9dad89b3de1d7f9a4b73a5d107c74f716a6e2e89d653c48ab47108b37ad699a
-
SHA512
042ea077acfc0dff8684a5eb304af15177c4e6f54c774471b8091669b1ab16833894ca7a52917f8a6bbeacbb6532db521cea61d70ac4c5c992cb4896083d6c93
-
SSDEEP
6144:6/QiQPZdDY39EiBeNyz9P8ISaLCW3MjukOQ/UBTlakaBdGOzGfnXpiQCsoazZPEj:CQiGZ+NEiBePIpLveu+MBTlPadSfXio0
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
-
Size
267KB
-
MD5
9e967a473010b430f5bde8d23b0cb9a6
-
SHA1
eed882f8ff642d0da9e89371e3ce75c1be317ad2
-
SHA256
66b03cc7950fb0df8607d07c4bdd45c74d2da333dcdbd97c5192c8b36b5ce039
-
SHA512
8916a36c24da3ef89066e226179e32ac3714ad72965e42f14fd38c6387c61c82118e519633f3ba628f5d3d5a45d237bdca7d6325d22599b2948503b0f2866fb7
-
SSDEEP
3072:6QaS+vmwKfvtCqXUAuImwJBZeTU/Cixao2mCtaFXM/h3:raS+vmwIttUAu+PDaodX
Score10/10-
Smokeloader family
-
Suspicious use of SetThreadContext
-
-
-
Target
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
-
Size
160KB
-
MD5
8f70a0f45532261cb4df2800b141551d
-
SHA1
521bbc045dfb7bf9fca55058ed2fc03d86cf8d00
-
SHA256
aa2c0a9e34f9fa4cbf1780d757cc84f32a8bd005142012e91a6888167f80f4d5
-
SHA512
3ea19ee472f3c7f9b7452fb4769fc3cc7591acff0f155889d08dadbd1f6ae289eaa310e220279318ac1536f99ea88e43ff75836aee47f3b4fbe8aa477cb9d099
-
SSDEEP
3072:ApO0Xavhlw60rsxWJ8D3yfiqIATrEFvEERHX6hS/6ZuPQXSon+k79eX4Yo:0/o8rsxWawiqDAxHX2SyZuPQXzqIN
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
-
Size
1.4MB
-
MD5
435a69af01a985b95e39fb2016300bb8
-
SHA1
fc4a01fa471de5fcb5199b4dbcba6763a9eedbee
-
SHA256
d5cdd4249fd1b0aae17942ddb359574b4b22ff14736e79960e704b574806a427
-
SHA512
ea21ff6f08535ed0365a98314c71f0ffb87f1e8a03cdc812bbaa36174acc2f820d6d46c13504d9313de831693a3220c622e2ae244ffbcfe9befcbc321422b528
-
SSDEEP
24576:M4UpDMuCSO5T9iKvkK1dA97hfNpZZ06nlvmp78nLBuzPG+7:AplyTv1gpJk98nLBuzu+7
-
Socelars family
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
-
-
Target
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
-
Size
1.6MB
-
MD5
c4e681d218d1c9c4efe701b4c7554eb5
-
SHA1
c3b43d0fbc5ad442067546b9d40c16810bb379da
-
SHA256
825a970bd11d349ba089e70419036c01ebb8cfd06e4abbec6bf58e9c7566a5e6
-
SHA512
b8d4ee6093835b0ec398f8884097db0bf1026e581743151241fb1489b061ba463dacf35b9af17f49ddc9d22769e9ebd763d9bfdb7e4d99e47a4e256c493ba3b5
-
SSDEEP
24576:ChvJVJdMs08u8gBtA9HantTyG8bm9Qwg4+wYv4KFkLgQESs1xCm/8tV1vW3x0Qq:S3d0VgBatTFLQwcwWzaLe1n8tzW3u
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
-
-
Target
7zS850A099E/61e74fda51500_Tue23260baecb.exe
-
Size
266KB
-
MD5
49edc32bbb405b39d7f2b7fe1b8df04f
-
SHA1
e6dd0214ee693e6b90ba1293c840327894772644
-
SHA256
5a14c836ca0af97881c91393b48232f81953b304acab8e42abf562cb02971f0a
-
SHA512
da0c36951c498d43d243fa28a153e90336ca49277f08c3a282914293958876c55ad72b26535575a344d4553fb30f5aa517d386e58960fa10358d56f9dbd3cc54
-
SSDEEP
3072:km9WbwvfxwTqXJSglK49OJUXcEm1vU/yqZVM/h3:0bwhw+JSg9OSch0hZV
Score10/10-
Smokeloader family
-
-
-
Target
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
-
Size
405KB
-
MD5
031f38d24ae18e9d3d3b878b9b1d8902
-
SHA1
b089e0f0d1809873b2d8d86e9c72f9136efa9983
-
SHA256
23facfbb54ebef4f301cd273be87ce89ae421f2cf2f79ebbc0e5338a54b4c356
-
SHA512
278dac8cbc45ad9e758da3f368e7f72e01b5e59d79c7176bfdf90a2bf1caf89f29c8852c66bff25c5ae8b4395724f54c8525e83881c1cd1f5b6ccd175852241d
-
SSDEEP
6144:V/Kw8p+TAL2ICoCn2A+OiSmLie6PgZzE7ITsq:VSHp+npoCn23/SmLDo8E7
Score10/10-
Gcleaner family
-
Onlylogger family
-
OnlyLogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
-
-
Target
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
-
Size
527KB
-
MD5
8e0bc14c20fd607593967f164bbf08b5
-
SHA1
f68dc21b6352302d36cb1953ac0065e30d1ca6b0
-
SHA256
af8fbb1b23a21d1be75abcbb8d7c8447ec0c3b309fcfb407a91576a06070dcfe
-
SHA512
71cb5f5cfc5bb858a3ec2b7cf94d1d0652b5b66c505c4016c9d86e19ba86352d5f8f332df11be163c4aa1d3d36fc892bcc5bd5f2fbd6a383cd4e36c9885c7639
-
SSDEEP
12288:mVjU0uQI16tK/eUAkKFtgVwxdM3YwFHu8/Z0:O8d0K/Gg8
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of SetThreadContext
-
-
-
Target
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
-
Size
523KB
-
MD5
c7f26d8e0ac6d899d6febd75f81f9cc3
-
SHA1
113fe52d0562fa3b591dffd633f0d3d6db4feee8
-
SHA256
762433792d60c6c384fca690a8b3b5ef9e2390fd18ad0abdec248229bd5d89bc
-
SHA512
6848bff0d6e6302598faf274e35cb46c5b076937098a15558a199fded52d65a6486a4ae7cb9f756ea01c5fe4a685759bb6d1bf60fcf794528548830683aaee64
-
SSDEEP
12288:v7jUMJlp52+itEciQkeh/8sJpyt54ePYFCcBBOyCwq18LkYRQsKdBR/:vPU2lp5VitYQcsJEWoHdX
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of SetThreadContext
-
-
-
Target
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
-
Size
1.6MB
-
MD5
79400b1fd740d9cb7ec7c2c2e9a7d618
-
SHA1
8ab8d7dcd469853f61ca27b8afe2ab6e0f2a1bb3
-
SHA256
556d5c93b2ceb585711ccce22e39e3327f388b893d76a3a7974967fe99a6fa7f
-
SHA512
3ed024b02d7410d5ddc7bb772a2b3e8a5516a16d1cb5fac9f5d925da84b376b67117daf238fb53c7707e6bb86a0198534ad1e79b6ebed979b505b3faf9ae55ac
-
SSDEEP
24576:nui93Vkg97e2KjCcGIG4W6VifDWIkJ7iJtxNhtNNefd0OIG3RQlyrLxoA8ZPo+Zn:dlJe9G3D6JYxpNNEd0OIcRfn0Po+Z1I
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
7zS850A099E/61e7502b8389b_Tue233252e9.exe
-
Size
362KB
-
MD5
bd97b9bdb9e842a76d084d9aae2157dc
-
SHA1
05855bb520005e4105f053d40c464cb8c7b2f2d0
-
SHA256
c739d1ae35aa6c63fb6f07b529bd25f77aad42260ed8a95a69487216fbb2b718
-
SHA512
3e5112f757f7e54399b14d4a00c695a1268f1cf4534db95fa3e7529c437add41b4cf5429747635c16d8fbe1c0123e4522a8b08867ede9de3b5c73b75987a2c32
-
SSDEEP
6144:os5wCYvpX57HjBi7g9dO1KIaDm18r7ITsq:oSJYvD7v9kqr7
-
Gcleaner family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
-
Size
666KB
-
MD5
81d975ad4ca267db5d3c50ea5875a563
-
SHA1
be11fb5a16735249000a48279cd1bd7aa8b06d90
-
SHA256
c724232309617b23a487c1713f4c90680354928f1d5f67200cdbe15e1421e43a
-
SHA512
ab822f7a07bbc124ea000afcd27c7c9981ce82d032e80369ba65959c5f83f28e15bec33cd9d5b740b41511bb7c7b15133739ace59f46cc13489d66d9e8e16df3
-
SSDEEP
12288:ie8137WLTO44cP9CVn7VvC7h0TDFvEiuIFGLGApi1Lk/F1Re4iUTsu:M4m44cPcJCV0SGIjpi14/F1Re4vA
Score3/10 -
-
-
Target
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
-
Size
116KB
-
MD5
b8ecec542a07067a193637269973c2e8
-
SHA1
97178479fd0fc608d6c0fbf243a0bb136d7b0ecb
-
SHA256
fc6b5ec20b7f2c902e9413c71be5718eb58640d86189306fe4c592af70fe3b7e
-
SHA512
730d74a72c7af91b10f06ae98235792740bed2afc86eb8ddc15ecaf7c31ec757ac3803697644ac0f60c2e8e0fd875b94299763ac0fed74d392ac828b61689893
-
SSDEEP
3072:MSjWaIBXlmXBGNDAeL/16v0R9hLG6Ls6rZzTyz+08n:maG8xG5dhLlzc78n
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
7zS850A099E/libcurl.dll
-
Size
218KB
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
-
SHA1
028ae3596c0790e6d7f9f2f3c8e9591527d267f7
-
SHA256
0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
-
SHA512
857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
SSDEEP
6144:Kk3jgivfCVSRrLV7yAVzKZIjCbanUKWw+ba//PXHUo:30iH0iVPVzKOOunLWf2//0
Score3/10 -
-
-
Target
7zS850A099E/libcurlpp.dll
-
Size
54KB
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
-
SHA1
b601a229b66ec3d19c2369b36216c6f6eb1c063e
-
SHA256
43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
-
SHA512
9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
SSDEEP
768:W//WT2mbP+7x4Mx5KzVAn/QqvtdZs8LlR67diTNh4joK7qmQhyOl4UuGoxX9j3D:WHIK1R2VA/Qqvtzz67dbn1QhyOl4UuD
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1