General
-
Target
setup_x86_x64_install23.exe
-
Size
6.5MB
-
Sample
250513-x21ymszwb1
-
MD5
591c62c68ce81550a99f07e173a56217
-
SHA1
4e5d00df20e12a0cc74189eb691e063b3a84990a
-
SHA256
1eb3574e7faa18d12759034dcc5a26ac90d79badef17cf1a744854d9a9e41cb0
-
SHA512
71f4068cc19d72251bbb29609d1ff2564228e1050c82006b82e45ac7f868c9e2cae3e738b2d3d30d372f2de4a4e1e52386cc54dede20848af4c92591dadfb4a5
-
SSDEEP
196608:yMz7bKY8qgkL5ZYlCV6JtZ1eJLPj4F4z/eHFDKED:yfY8V+5ZcCVmZ1eJLPj4ujeHxLD
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install23.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
setup_x86_x64_install23.exe
Resource
win11-20250502-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
privateloader
http://37.0.10.244/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
redline
medianew
91.121.67.60:62102
Extracted
nullmixer
http://hsiens.xyz/
Extracted
redline
ANI
45.142.215.47:27643
Extracted
gcleaner
194.145.227.161
Targets
-
-
Target
setup_x86_x64_install23.exe
-
Size
6.5MB
-
MD5
591c62c68ce81550a99f07e173a56217
-
SHA1
4e5d00df20e12a0cc74189eb691e063b3a84990a
-
SHA256
1eb3574e7faa18d12759034dcc5a26ac90d79badef17cf1a744854d9a9e41cb0
-
SHA512
71f4068cc19d72251bbb29609d1ff2564228e1050c82006b82e45ac7f868c9e2cae3e738b2d3d30d372f2de4a4e1e52386cc54dede20848af4c92591dadfb4a5
-
SSDEEP
196608:yMz7bKY8qgkL5ZYlCV6JtZ1eJLPj4F4z/eHFDKED:yfY8V+5ZcCVmZ1eJLPj4ujeHxLD
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Xmrig family
-
OnlyLogger payload
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
6.4MB
-
MD5
ba006f1773c915924ac591d1d0be5f93
-
SHA1
a2c813e0fb3931ce4cdbcc0550e7251eac0c462d
-
SHA256
b1487e330fa196d897d0afc4f06540f8c94af8cfcb49d86e49673577b0d3869c
-
SHA512
a38fa78807f193d935b81829fb714e3b87a32c3dadfe37c5e7780fcfd23d53028088f9a4f0bb2a0ac1a633e224de8fa992ee30d2d50cd58033b7edd4e5567255
-
SSDEEP
196608:xq3a/EavTvJiRYqtZKQJuvkKE/ftLXqCo7QAsDIb/:xuaTM5msuvE/fRqj8AwIr
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Xmrig family
-
OnlyLogger payload
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1