General
-
Target
setup_x86_x64_install3.exe
-
Size
7.1MB
-
Sample
250513-xdxajsypy2
-
MD5
4b2f083706cd4d27905d9ae767e5e108
-
SHA1
4b6f4f9bfd561d01d2b392d4846f517730b2e117
-
SHA256
6e4d9abc645cabc745bdbc1414a505e657156ed49403e74cb3f1edb393510524
-
SHA512
c3d8e12e44eeb2c048dc4795ee09e2a77934cd3931b05071bdd608ac0f86ca114255936233d8951a168d6089e36728e4f4d0eddd3d7f1e721da825538578a90d
-
SSDEEP
196608:JQBZQVQa6dAAo6d+E3u/T0Jo5KAuigEwCq:J4Z+QaYJd+O1Auig9Cq
Static task
static1
Malware Config
Extracted
socelars
http://www.biohazardgraphics.com/
Extracted
nullmixer
http://kelenxz.xyz/
Extracted
redline
media20n
65.108.69.168:13293
-
auth_value
c66c58bd1c5c7f021227a8dae1d7d65d
Extracted
redline
v3user1
159.69.246.184:13127
-
auth_value
54df5250af9cbc5099c3e1e6f9e897c0
Extracted
vidar
49.1
915
https://noc.social/@sergeev46
https://c.im/@sergeev47
-
profile_id
915
Targets
-
-
Target
setup_x86_x64_install3.exe
-
Size
7.1MB
-
MD5
4b2f083706cd4d27905d9ae767e5e108
-
SHA1
4b6f4f9bfd561d01d2b392d4846f517730b2e117
-
SHA256
6e4d9abc645cabc745bdbc1414a505e657156ed49403e74cb3f1edb393510524
-
SHA512
c3d8e12e44eeb2c048dc4795ee09e2a77934cd3931b05071bdd608ac0f86ca114255936233d8951a168d6089e36728e4f4d0eddd3d7f1e721da825538578a90d
-
SSDEEP
196608:JQBZQVQa6dAAo6d+E3u/T0Jo5KAuigEwCq:J4Z+QaYJd+O1Auig9Cq
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Socelars family
-
Socelars payload
-
Vidar family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-