General
-
Target
x86_x64_setup.exe
-
Size
2.8MB
-
Sample
250513-vwxypaywdw
-
MD5
bda41ecaa52e302ffb309a6dac116897
-
SHA1
09c005f0e8ebdb6f3d2564570d404415e2564a8b
-
SHA256
87a1ca2aa8e2828a854d42a7712de25d8bbf11763372257ecab9827e79865508
-
SHA512
d10cd536829cd3129f616102d1817debd12b063036fd0441155541ae8ca6af8ffe38d9e9100b22cabb66d43b14c45ec9d52b38f5f31ef67cb70953b6cd6a21d5
-
SSDEEP
49152:Ege9LNIfjmcuTBiDUQBb2VqWgX3gI7EWNn4n6uviA8YUdu9TLHK:JeFNIOTBMUQBqorDtx46g8YuV
Static task
static1
Behavioral task
behavioral1
Sample
x86_x64_setup.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
x86_x64_setup.exe
Resource
win11-20250502-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
redline
Cana
176.111.174.254:56328
Targets
-
-
Target
x86_x64_setup.exe
-
Size
2.8MB
-
MD5
bda41ecaa52e302ffb309a6dac116897
-
SHA1
09c005f0e8ebdb6f3d2564570d404415e2564a8b
-
SHA256
87a1ca2aa8e2828a854d42a7712de25d8bbf11763372257ecab9827e79865508
-
SHA512
d10cd536829cd3129f616102d1817debd12b063036fd0441155541ae8ca6af8ffe38d9e9100b22cabb66d43b14c45ec9d52b38f5f31ef67cb70953b6cd6a21d5
-
SSDEEP
49152:Ege9LNIfjmcuTBiDUQBb2VqWgX3gI7EWNn4n6uviA8YUdu9TLHK:JeFNIOTBMUQBqorDtx46g8YuV
-
Modifies Windows Defender Real-time Protection settings
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
2.7MB
-
MD5
256f61bc0d5b2f51ab65297237b46385
-
SHA1
773cdaafaed076b666576a524333e5a06b76afd4
-
SHA256
f927ee4fd2e0cabff535ab9704653f02b1d084a7537b923f7e87ce7cc7e12e27
-
SHA512
44d9710828d67ce217d03c4bed9f7c3efca854cd30348c61fa5aa58b7373ac5d55063419f5bc9fd1c8ec9c0a43a527b7ba3c91bd7419baade70498204d751d0b
-
SSDEEP
49152:xcBLPkZVi7iKiF8cUvFyP7OWMH/5dk3HxnwOsmiyMlLMNHEwJ84vLRaBtIl9mTgS:xPri7ixZUvFyPSPdOwOUokCvLUBsKR/
-
Modifies Windows Defender Real-time Protection settings
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-