General

  • Target

    setup_x86_x64_install.exe.bin

  • Size

    3.8MB

  • Sample

    250513-xzbwqsyr14

  • MD5

    f8e67dea6c5f615bf26f4f81a74e61b1

  • SHA1

    12f971977bfdcc530008ceb9d62cde2402101094

  • SHA256

    f293d2c8a9024e2f3ad715b4bf4918b036b9d1955bf984024e8b3511369bb713

  • SHA512

    03066d8ce13032604cd2c6ace2cc61091d52d46bb4d260c6182869f5d9069b37bf9b750949671967a37caf3fd114be3a4d060759271e0d4fa5c2e8220e1d19c3

  • SSDEEP

    98304:yDyC6Q7U+6IJlSECKL6JqAdif5anU1i3cb+lilFvtCo:ymMz6wzMqAdEGUlj

Malware Config

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

nullmixer

C2

http://sornx.xyz/

Targets

    • Target

      setup_x86_x64_install.exe.bin

    • Size

      3.8MB

    • MD5

      f8e67dea6c5f615bf26f4f81a74e61b1

    • SHA1

      12f971977bfdcc530008ceb9d62cde2402101094

    • SHA256

      f293d2c8a9024e2f3ad715b4bf4918b036b9d1955bf984024e8b3511369bb713

    • SHA512

      03066d8ce13032604cd2c6ace2cc61091d52d46bb4d260c6182869f5d9069b37bf9b750949671967a37caf3fd114be3a4d060759271e0d4fa5c2e8220e1d19c3

    • SSDEEP

      98304:yDyC6Q7U+6IJlSECKL6JqAdif5anU1i3cb+lilFvtCo:ymMz6wzMqAdEGUlj

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »