General
-
Target
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d
-
Size
5.3MB
-
Sample
250328-takwkax1cx
-
MD5
4f14d356b2a394b1a3f90bae9a3f317f
-
SHA1
0bc912726c22104fcfd7b8a0a612981f54757e92
-
SHA256
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d
-
SHA512
44a6c3924c02cbbdea09eb0a0ddbc6723102b258f3349a213c63e7bee4f1c9c7fe6fef6011edfaceff6e1e40b03a7c5565eb94a99ccd0ebb6bf75e83481441f6
-
SSDEEP
98304:/UwBA3J6SE90ZotV1pTH1l8xoXu7OMDZoSbRUMF+EYOgYcE61DIbyvUsd/FX4ACv:/Uog/e02JAoX4RUMFHcj2GXh4Ra
Static task
static1
Behavioral task
behavioral1
Sample
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://wxayfarer.live/ALosnz
https://esccapewz.run/ANSbwqy
https://travewlio.shop/ZNxbHi
https://iatouvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://holidamyup.today/AOzkns
https://triplooqp.world/APowko
https://oreheatq.live/gsopp
https://xcastmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://7targett.top/dsANGt
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
https://castmaxw.run/ganzde
https://-smeltingt.run/giiaus
https://8ferromny.digital/gwpd
https://travelilx.top/GSKAiz
https://-weldorae.digital/geds
https://skynetxc.live/AksoPA
https://byteplusx.digital/aXweAX
https://apixtreev.run/LkaUz
https://tsparkiob.digital/KeASUp
https://appgridn.live/LEjdAK
https://cosmosyf.top/GOsznj
https://touvrlane.bet/ASKwjq
https://mtriplooqp.world/APowko
Extracted
vidar
13.3
928af183c2a2807a3c0526e8c0c9369d
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Targets
-
-
Target
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d
-
Size
5.3MB
-
MD5
4f14d356b2a394b1a3f90bae9a3f317f
-
SHA1
0bc912726c22104fcfd7b8a0a612981f54757e92
-
SHA256
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d
-
SHA512
44a6c3924c02cbbdea09eb0a0ddbc6723102b258f3349a213c63e7bee4f1c9c7fe6fef6011edfaceff6e1e40b03a7c5565eb94a99ccd0ebb6bf75e83481441f6
-
SSDEEP
98304:/UwBA3J6SE90ZotV1pTH1l8xoXu7OMDZoSbRUMF+EYOgYcE61DIbyvUsd/FX4ACv:/Uog/e02JAoX4RUMFHcj2GXh4Ra
-
Amadey family
-
Detect Vidar Stealer
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Lumma family
-
Modifies WinLogon for persistence
-
Modifies security service
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Authentication Process
1Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2