General
-
Target
e31548b85abb75e70ead38c8788ca2f92d2ad1139a12f854280d1b4c866133ef.exe
-
Size
4.3MB
-
Sample
241123-xbw7rszqbt
-
MD5
02edae0b24bd649b14ed60f60b40fa39
-
SHA1
e7e43bcc50b87cee43f455b7858ba7f35d011c78
-
SHA256
e31548b85abb75e70ead38c8788ca2f92d2ad1139a12f854280d1b4c866133ef
-
SHA512
c05956e9db77228bb9889ad8324c3884eac22685ca1f974262513fbcafb8e1fde35d8c66f18888500e533cb5a4d14e32ad89e0e2607999b3630819f982e98ab9
-
SSDEEP
98304:JjzQoMAXPmuTOQVdH/3RLSsKyBlF7AAY4R48OTA2JlwM+CMpg2:JXQoMAf7TzL5mNyJAAYXXwM+E2
Static task
static1
Behavioral task
behavioral1
Sample
e31548b85abb75e70ead38c8788ca2f92d2ad1139a12f854280d1b4c866133ef.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e31548b85abb75e70ead38c8788ca2f92d2ad1139a12f854280d1b4c866133ef.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://marianu.xyz/
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
redline
ChrisNEW
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
gcleaner
gcl-gb.biz
45.9.20.13
Targets
-
-
Target
e31548b85abb75e70ead38c8788ca2f92d2ad1139a12f854280d1b4c866133ef.exe
-
Size
4.3MB
-
MD5
02edae0b24bd649b14ed60f60b40fa39
-
SHA1
e7e43bcc50b87cee43f455b7858ba7f35d011c78
-
SHA256
e31548b85abb75e70ead38c8788ca2f92d2ad1139a12f854280d1b4c866133ef
-
SHA512
c05956e9db77228bb9889ad8324c3884eac22685ca1f974262513fbcafb8e1fde35d8c66f18888500e533cb5a4d14e32ad89e0e2607999b3630819f982e98ab9
-
SSDEEP
98304:JjzQoMAXPmuTOQVdH/3RLSsKyBlF7AAY4R48OTA2JlwM+CMpg2:JXQoMAf7TzL5mNyJAAYXXwM+E2
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
4.3MB
-
MD5
c12fe256228c8c0403ef35279aca6f58
-
SHA1
840a4eaf832f3cd154f0766dbc415a32c181e200
-
SHA256
86271c0587581b77766414a1238238011c10a5a06255b4611ac3b058f4529c2b
-
SHA512
88689761f0eeedc4ff633744dab15b26ad7352bda1f0329ed920dce463118ea11a14249cfd636aa3d39dbdabbcb1342138b7b5255a3791faf8ad955c63f5ff11
-
SSDEEP
98304:xRCvLUBsgElXqpZspVj14x8YkF1SUBBrttz1hNOtlVYgb:x6LUCgEBqpZFO9PttzM/h
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1