General
-
Target
54993cafb45684179f8b736cea27a09c151cd68429344c3a430290c8d5ee359c.exe
-
Size
4.2MB
-
Sample
241122-jcqjqasndn
-
MD5
ac6d650599291df774c24c0d9ac7ad09
-
SHA1
974ffb69b1b62b540d43665ae8359ac7109873e5
-
SHA256
54993cafb45684179f8b736cea27a09c151cd68429344c3a430290c8d5ee359c
-
SHA512
d553afcfd9c759fd5ea46f5cbfe1b2c0251c72d85f7869b49e742cb1062653a5dffd301c59995941f5966035d740491d3e0e2110edc451dd9802cc01655f61bf
-
SSDEEP
98304:JfyG7RUZzWKznGD6OuLq1fHGS3cdXlOgpuEzMEvI6JNUxSLmJ:JKiUtWKznGDqqNHdcLOgpWEvICCJ
Static task
static1
Behavioral task
behavioral1
Sample
54993cafb45684179f8b736cea27a09c151cd68429344c3a430290c8d5ee359c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
54993cafb45684179f8b736cea27a09c151cd68429344c3a430290c8d5ee359c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://marianu.xyz/
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
redline
media21
91.121.67.60:2151
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Extracted
redline
Chris
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
redline
sehrish
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
gcleaner
gcl-gb.biz
45.9.20.13
Targets
-
-
Target
54993cafb45684179f8b736cea27a09c151cd68429344c3a430290c8d5ee359c.exe
-
Size
4.2MB
-
MD5
ac6d650599291df774c24c0d9ac7ad09
-
SHA1
974ffb69b1b62b540d43665ae8359ac7109873e5
-
SHA256
54993cafb45684179f8b736cea27a09c151cd68429344c3a430290c8d5ee359c
-
SHA512
d553afcfd9c759fd5ea46f5cbfe1b2c0251c72d85f7869b49e742cb1062653a5dffd301c59995941f5966035d740491d3e0e2110edc451dd9802cc01655f61bf
-
SSDEEP
98304:JfyG7RUZzWKznGD6OuLq1fHGS3cdXlOgpuEzMEvI6JNUxSLmJ:JKiUtWKznGDqqNHdcLOgpWEvICCJ
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
4.1MB
-
MD5
ae5e11ff9817f4f3914d157238282145
-
SHA1
0d3c1e692f917f09a15176eb5fe37ab9e16794b5
-
SHA256
de9fbfa62624a865ead2325021738eeef86631758847fc07944e0b3295513332
-
SHA512
bf2d1914e1615b70ee0a623786ca57c689e805fc932959f0e410821bdd86cbdeb2916d32a77dae11a7ec1418581fa82052f9ad81e7ada28765f0a65458e225d9
-
SSDEEP
98304:xhCvLUBsgZ2N6qDvRkz065C2CaBq7YSKszfiWahfM//MDTH+u8J4:xqLUCg0N6qdqthV0fKsqu//ILN8J4
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1