General

  • Target

    1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577N.exe

  • Size

    7.5MB

  • Sample

    241123-tqgh3stnhl

  • MD5

    7530519bb092b8efaeffa5fe0c98c530

  • SHA1

    46b46eab7c7df244e00b62ae71a58e8ea59ae764

  • SHA256

    1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577

  • SHA512

    3e3e2751cccfb6addf85a5f656f35e3bdabc0b03dbf28d9782fd6d39460adea4ffeb4fcf512115d9b0485048cb4a18532bdd284b3a0c68bb53158a777f434ac1

  • SSDEEP

    196608:xqwVbwdkjjHPyoXYqMkV3xH6OP5hHnYtmj643Rl:xtBwdG7PDIqtVBHki

Malware Config

Extracted

Family

nullmixer

C2

http://hornygl.xyz/

Extracted

Family

socelars

C2

http://www.chosenncrowned.com/

Extracted

Family

redline

Botnet

media25pqs

C2

65.108.69.168:13293

Attributes
  • auth_value

    e792d0d7a03fceb57d0e07caa26bb34f

Extracted

Family

vidar

Version

49.2

Botnet

915

C2

https://mstdn.social/@kipriauk9

https://qoto.org/@kipriauk8

Attributes
  • profile_id

    915

Targets

    • Target

      1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577N.exe

    • Size

      7.5MB

    • MD5

      7530519bb092b8efaeffa5fe0c98c530

    • SHA1

      46b46eab7c7df244e00b62ae71a58e8ea59ae764

    • SHA256

      1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577

    • SHA512

      3e3e2751cccfb6addf85a5f656f35e3bdabc0b03dbf28d9782fd6d39460adea4ffeb4fcf512115d9b0485048cb4a18532bdd284b3a0c68bb53158a777f434ac1

    • SSDEEP

      196608:xqwVbwdkjjHPyoXYqMkV3xH6OP5hHnYtmj643Rl:xtBwdG7PDIqtVBHki

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Vidar Stealer

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks