General
-
Target
e60aa7cfc1e59d86051faaa21aee6a9ba4da6fe6f402da363b4acc0456c6dff7
-
Size
6.0MB
-
Sample
241124-e469bstqev
-
MD5
d6152cb8dcb623d516569f9218593f73
-
SHA1
4ab62cf83d8ad18bbad3bc0521f76a792f7fa899
-
SHA256
e60aa7cfc1e59d86051faaa21aee6a9ba4da6fe6f402da363b4acc0456c6dff7
-
SHA512
782c1f6a591c1c98afbf6b2c1f0ad0cb40549dfd63f0457e9023a5bc3c4a827980c076df597f48b5430b3556be52143ddea9e3aad030e87feb3d4cdf02bd9d00
-
SSDEEP
98304:JDIWTs1VlCnbKlP//WnVdXir3HpxImpu8OhwQwWx4LuJ+ygmLPoc1mjf8Ty6w6fB:JkQs1Dq42byr3HHImDOhl46J8j8Ty6pZ
Static task
static1
Behavioral task
behavioral1
Sample
e60aa7cfc1e59d86051faaa21aee6a9ba4da6fe6f402da363b4acc0456c6dff7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e60aa7cfc1e59d86051faaa21aee6a9ba4da6fe6f402da363b4acc0456c6dff7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
redline
media17
91.121.67.60:2151
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Extracted
vidar
41.4
916
https://mas.to/@sslam
-
profile_id
916
Extracted
redline
ANI
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Targets
-
-
Target
e60aa7cfc1e59d86051faaa21aee6a9ba4da6fe6f402da363b4acc0456c6dff7
-
Size
6.0MB
-
MD5
d6152cb8dcb623d516569f9218593f73
-
SHA1
4ab62cf83d8ad18bbad3bc0521f76a792f7fa899
-
SHA256
e60aa7cfc1e59d86051faaa21aee6a9ba4da6fe6f402da363b4acc0456c6dff7
-
SHA512
782c1f6a591c1c98afbf6b2c1f0ad0cb40549dfd63f0457e9023a5bc3c4a827980c076df597f48b5430b3556be52143ddea9e3aad030e87feb3d4cdf02bd9d00
-
SSDEEP
98304:JDIWTs1VlCnbKlP//WnVdXir3HpxImpu8OhwQwWx4LuJ+ygmLPoc1mjf8Ty6w6fB:JkQs1Dq42byr3HHImDOhl46J8j8Ty6pZ
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Vidar family
-
OnlyLogger payload
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
5.9MB
-
MD5
2054a395da9f7a789bef703c5d2d60c1
-
SHA1
f170cbc93d4fb3f4f92ccd88039272bf78bdfa89
-
SHA256
1e083736aeca35b40f45693442d37466fa7b61ab36b2cebc2a49cb8c8492a433
-
SHA512
1439382b36a24d898fc769a742b05c2c9ad898a6e5750e0f7e813fd5d536834e44572061efb0c89af72c5a97c3502e9ee30c2c861154f0fbb4c4164e3880ffcf
-
SSDEEP
98304:xHCvLUBsghjeXIZ90vNP7S5OFFh506+n5+4fKwKy7mGVYQUki4mG:xkLUCghZ90e5+50T7fKwV7mGaQBmG
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Vidar family
-
OnlyLogger payload
-
Vidar Stealer
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1