General
-
Target
bad_boost.exe
-
Size
4.1MB
-
Sample
250516-1ejydshn61
-
MD5
4b362819a901340526ba9a94771fb73d
-
SHA1
8cd188afe7a8ceced6bcc93e7e8b524dfd7ed15f
-
SHA256
00706aeb7422cf62dbcf72342b913d32e85a68d025629d9ea464162ece67bcc2
-
SHA512
16e29360c138dbdaf1e071150044a4fb629cd3b17e6cadc255ebd2d74157ef62e64f8e54cbbaf0ecf8387e7beb7472ed54cf1047a24619c890e9632969c8f2b8
-
SSDEEP
98304:yn7u7WczaQCrJmXyFl983PLsXvHUAaH2cDM:ynTczugXyFWsXvH11
Static task
static1
Malware Config
Extracted
privateloader
http://37.0.10.244/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.znsjis.top/
Extracted
nullmixer
http://hsiens.xyz/
Extracted
redline
NANANI
45.142.215.47:27643
Targets
-
-
Target
bad_boost.exe
-
Size
4.1MB
-
MD5
4b362819a901340526ba9a94771fb73d
-
SHA1
8cd188afe7a8ceced6bcc93e7e8b524dfd7ed15f
-
SHA256
00706aeb7422cf62dbcf72342b913d32e85a68d025629d9ea464162ece67bcc2
-
SHA512
16e29360c138dbdaf1e071150044a4fb629cd3b17e6cadc255ebd2d74157ef62e64f8e54cbbaf0ecf8387e7beb7472ed54cf1047a24619c890e9632969c8f2b8
-
SSDEEP
98304:yn7u7WczaQCrJmXyFl983PLsXvHUAaH2cDM:ynTczugXyFWsXvH11
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-