General
-
Target
544097d6d935fb1fa603b3028499e1923fa7fd5f01ca3f4e95fdcaf9a428fe5f.exe
-
Size
3.5MB
-
Sample
241123-zrd28ssmck
-
MD5
ccab788bf350cfdc5f84d4ffd9d986a6
-
SHA1
bb6858e873b2463b225ca6031ceb6ae62bd20038
-
SHA256
544097d6d935fb1fa603b3028499e1923fa7fd5f01ca3f4e95fdcaf9a428fe5f
-
SHA512
9db67b771f5ce16a29ab7b827863891689ddfa1952d50621a6cad2e4a32adc5b05ebff70d03d5669ec1e96768f65881882b95cf7f14a0404accc01971ae83536
-
SSDEEP
98304:JDgLBluDfg9t3hOpvKHXOhczp0fC6bSRcz:JDSHSg9t30pvQXkwiCjU
Static task
static1
Behavioral task
behavioral1
Sample
544097d6d935fb1fa603b3028499e1923fa7fd5f01ca3f4e95fdcaf9a428fe5f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
544097d6d935fb1fa603b3028499e1923fa7fd5f01ca3f4e95fdcaf9a428fe5f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
nullmixer
http://mooorni.xyz/
Extracted
redline
fucker2
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
redline
media21
91.121.67.60:2151
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Extracted
redline
Chris
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
gcleaner
gcl-gb.biz
45.9.20.13
Targets
-
-
Target
544097d6d935fb1fa603b3028499e1923fa7fd5f01ca3f4e95fdcaf9a428fe5f.exe
-
Size
3.5MB
-
MD5
ccab788bf350cfdc5f84d4ffd9d986a6
-
SHA1
bb6858e873b2463b225ca6031ceb6ae62bd20038
-
SHA256
544097d6d935fb1fa603b3028499e1923fa7fd5f01ca3f4e95fdcaf9a428fe5f
-
SHA512
9db67b771f5ce16a29ab7b827863891689ddfa1952d50621a6cad2e4a32adc5b05ebff70d03d5669ec1e96768f65881882b95cf7f14a0404accc01971ae83536
-
SSDEEP
98304:JDgLBluDfg9t3hOpvKHXOhczp0fC6bSRcz:JDSHSg9t30pvQXkwiCjU
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
OnlyLogger payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
3.5MB
-
MD5
fc3533e313c49ffe6437e82a2c619d7e
-
SHA1
1778cc5277b8b7691fee1a70f3202fdc12c9f233
-
SHA256
87b0c1c46b84d57c0255929e6599bf70bcd76d9d9db47d70c65b764c7f4c90b7
-
SHA512
06f51c5972dae3775fac8aa3e0af0ecc87702c620fb82baafc287189e671a3f35d59f4c2dde6332394324b43db1afe57915ccd06037a5bb511ce8db0b3bcfa98
-
SSDEEP
98304:xoCvLUBsgYoi8MssUe5imt854EMhM7DLPwQLF:x1LUCg3tMssVFtY4E3HbwsF
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
OnlyLogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1