General
-
Target
JaffaCakes118_b232b6fd79bf901483714e8b634adb3b7a43857677f696a4499a5c2137868997
-
Size
9.9MB
-
Sample
241225-wk9c1s1php
-
MD5
25121fc74590eeb15174adbede80d7e1
-
SHA1
7b8ac0440263fd7a14d47e1b635c17c6c43905dc
-
SHA256
b232b6fd79bf901483714e8b634adb3b7a43857677f696a4499a5c2137868997
-
SHA512
73272331c8ad65c478507c5450d408ad74d44b3c45af21751f1850eef11928a73e50d40754d768941a60242558e4fe6aad76ac761b9c14c123023ff11f0a07c7
-
SSDEEP
196608:qCtsWl6uPiR9iAFom4OV3A8/6Lhl9aehDEtnc5UMS5Nbo5kcDilsPZ4LyicDDU2:qCtfRPev4E3A8i12He5sL0iS42
Static task
static1
Behavioral task
behavioral1
Sample
04cfb78f7af98b7b254cad238ff168fa2946d64bb6583c8783eabcd22e0fa934.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
04cfb78f7af98b7b254cad238ff168fa2946d64bb6583c8783eabcd22e0fa934.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://hornygl.xyz/
Extracted
socelars
http://www.chosenncrowned.com/
Extracted
privateloader
http://212.193.30.45/proxies.txt
http://45.144.225.57/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
2.56.59.42
Extracted
cryptbot
zyofvl37.top
morynt03.top
-
payload_url
http://yapstn04.top/download.php?file=daladi.exe
Targets
-
-
Target
04cfb78f7af98b7b254cad238ff168fa2946d64bb6583c8783eabcd22e0fa934
-
Size
9.9MB
-
MD5
fee4349ec343cb15b97cea31b6f3a996
-
SHA1
6d1478cdad5d5b8f1a10a7f054049eeb3cff7baf
-
SHA256
04cfb78f7af98b7b254cad238ff168fa2946d64bb6583c8783eabcd22e0fa934
-
SHA512
bc42b5593279bf8142de33c2ab13a0d88a9aad72fde52d68ca72ad63274c81c01c4d8b44a916458f4baa0f58b644d53beda5c06ab54e9c30da38128145ff395b
-
SSDEEP
196608:JSZ3cB2fsAFFeIQ/aq0rIRoJEHZqMjQ96UEAjTLlEANuFDr/RCB:J4LfsAWhiZJka9zTLlxCjRY
-
Cryptbot family
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Socelars family
-
Socelars payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
setup_installer.exe
-
Size
9.8MB
-
MD5
640ef8b7b13326af0747a293aec5f5b3
-
SHA1
002bcadeae4bf25aeee160e1b84d8fc8c14af10e
-
SHA256
03666c6f68c8ea9fa08a06424078f57905c81dd32967823c23ffe57b554f0452
-
SHA512
20a64bd09671336b7af157763785ae61519c418783a9e0393f67dd3adc01bd6ca61e518a207683ed2b979f2deb23b84623a351c99e6aa80e0c2dd1f7a85ef5e2
-
SSDEEP
196608:xPM5h8YrFMTlRu2pP5+yzDC+Cvu2UhX5uAekUXUfjsC6nrNqtb:xPMz8+F+lI2P51Di+tVeZyIPSb
-
Cryptbot family
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Socelars family
-
Socelars payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1