General
-
Target
250519-cagepsgm3t.bin
-
Size
59.5MB
-
Sample
250519-ctmqtsgp3w
-
MD5
db2a64ed6dac0099bc7ffb6de294cbb0
-
SHA1
8f9d116a00838d07aeefefbb4e9b12b3752f170b
-
SHA256
113b0924918108cb91c24df1430e507ca69b8ea67be90f8d2dc6f12fa9122181
-
SHA512
5a00102418f2d8f30d0c75a1b39c509aa2db51e6b4eb29330aec873abe347cf25b0c1e6ac48b7dfaf98ea20f4c8816d91c65076b61b35fa7e8ac2470b3520355
-
SSDEEP
1572864:bnMyy0iqwhWP4Vwg/MepmMJyQGvZnHlONwMtGh2N3x:bMciqwhWgVwg/Md4yQGvZnHlO1V3x
Static task
static1
Behavioral task
behavioral1
Sample
DIANTRE.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
Tsar2.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
Tsar3.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
TsarBomba.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
redline
cheat
154.91.34.165:64951
Extracted
discordrat
-
discord_token
MTM0OTU1Nzg2MTk3NzY4NjExOA.GZnBJ8.ModoCKrx8GueOq0zGHlbO14l4wHwAZe9839-DA
-
server_id
1350894549899411528
Extracted
C:\fa79de221d524b769d0447\Data breach warning.txt
https://qtox.github.io
http://raworldw32b2qxevn3gp63pvibgixr4v75z62etlptg3u3pmajwra4ad.onion
http://161.35.200.18
https://gofile.io/d/ufuFye
Extracted
C:\fnsYm5R5i.README.txt
lockbit
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
http://lockbitapt.uz
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupp.uz
https://tox.chat/download.html
Extracted
C:\ahIFlNJOT.README.txt
lockbit
https://twitter.com/hashtag/lockbit?f=live
https://tox.chat/download.html
Extracted
C:\d_cachefFkiLT6vY667h6bO\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Extracted
vipkeylogger
Extracted
masslogger
-
exfiltration_mode
#SMTPEnabled
-
expire_time_date
2025-06-14
-
host_password
DhakaHome2024
-
host_port
587
- host_receiver
- host_sender
-
host_server
mail.dhakahome.com
-
ssl_slate
True
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
vidar
13.6
158fdd2a4f5abb978509580715e5353f
https://t.me/m00f3r
https://steamcommunity.com/profiles/76561199851454339
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
gh0strat
192.168.1.221
Extracted
cobaltstrike
987654321
http://103.171.35.26:9443/dot.gif
-
access_type
512
-
beacon_type
2048
-
host
103.171.35.26,/dot.gif
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
9443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCYwABfVZCivHbnjZUO+BO81zPgD/iC2oPyKTKg/ktH1Zbz3KyDsPWnMof9juyAfTGI73mxgqkNUk3MwtLRfIqw+cleDaWzp4gE2tnKy9qy4dqKpTA6yNxxtvSYH3EW3YQb7BsYeNZclmAmezp4zgRUwqydV21a6CYhEsjH2IeQ7wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUSMSE)
-
watermark
987654321
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
194.145.227.161
Extracted
xworm
5.0
paltalkroom.ddns.net:65236
Y1mBse1uakfJ6zP1
-
Install_directory
%Temp%
-
install_file
test.exe
Extracted
privateloader
http://45.133.1.182/proxies.txt
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
nullmixer
http://hsiens.xyz/
Extracted
redline
jamesbig
65.108.20.195:6774
Extracted
vidar
41
706
https://mas.to/@killern0
-
profile_id
706
Targets
-
-
Target
DIANTRE.exe
-
Size
181KB
-
MD5
4b0110af5a72e67cec6658288e1eff17
-
SHA1
3ccb66dc69ee49efea11ce16b7141231774f83c8
-
SHA256
f7c16702691c9994039953698fb3ebba129b67a19399d237187cbe2b3549e549
-
SHA512
9d01276fcf0ee1a04f50a789ca04e65c258b9535be91f13bcfe21211e2997dee9c9aa0b9493977e9e24ee49de236a3537eccc1feecc0c653a2909a7edbdf1fa6
-
SSDEEP
3072:QV6J7DKdmNZTfoviqI31TE4k1q0CkOJt2B2amYJVcnId1OPPEY4Cf/3:L7DKduDovdMTE46C5Jt2o9jO14EYZff
Score1/10 -
-
-
Target
Tsar2.exe
-
Size
27.5MB
-
MD5
c727fdd03392adb14724ee5cccf3f01c
-
SHA1
0636c0fa0e1468941667ee31b86220e9300fcb0e
-
SHA256
6ce1e9b6a5920124d1f561cb97a3e33f69ac8494f20a53af3e00b2616ab78baf
-
SHA512
a5b433df2fa86e9d4c0f3405fee6e25d4542ff60bdffa21170fb9ef51674ecda8c2d077c5187e6e0fa447ce91b9e6dcc2b35123d6844dbae2281cb4c327689e1
-
SSDEEP
786432:Tlb06NOJoaeIbJ7fj60BEL5ZcZqXkaZo6ss1Y:RZOKaeIbi5yZqX3Zo6g
-
Ades_stealer family
-
Chaos Ransomware
-
Chaos family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Rokrat payload
-
Detect Umbral payload
-
Detect Xworm Payload
-
Detected Xorist Ransomware
-
Detects AdesStealer
-
Discordrat family
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Floxif family
-
Lockbit family
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Masslogger family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service
-
Modiloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RA World
RA World ransomware, also known as RA Group, is a crypto-ransomware variant that has evolved from the earlier Babuk ransomware. It emerged in April 2023.
-
Raworld family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Rokrat family
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Sality family
-
SectopRAT payload
-
Sectoprat family
-
UAC bypass
-
Umbral family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Windows security bypass
-
Xorist family
-
Xworm family
-
DCRat payload
-
Detects Floxif payload
-
ModiLoader Second Stage
-
Renames multiple (180) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Windows security modification
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
Tsar3.exe
-
Size
28.0MB
-
MD5
9d5cc021c717c67eddfbf3e02b5e6dc5
-
SHA1
dd333af1d10fb0ea0542e878a0b70bdba22b469c
-
SHA256
1b3e438ef3a09058ddc016b8b7dda3cfde411c773a45eae629f36202b83a86f5
-
SHA512
9f0b92c7d3452f2de97ea3e69dc72423606132a5b5e3092f4424ecba184b003622c7ca7dc5d722e2a5157f38f66128781021eab323784544a1f846c44bd7ae2f
-
SSDEEP
786432:AWZL9CVOBV7QGst9Ozg90Sp0XCCLAkq9wKdMPpbs:AWZL9WOBVsGst9Ozg5ICUzVNBb
-
Ades_stealer family
-
Chaos Ransomware
-
Chaos family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Rokrat payload
-
Detect Umbral payload
-
Detected Xorist Ransomware
-
Detects AdesStealer
-
Discordrat family
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Floxif family
-
Lockbit family
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Masslogger family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Rokrat family
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Sality family
-
SectopRAT payload
-
Sectoprat family
-
Umbral family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Xorist family
-
DCRat payload
-
Detects Floxif payload
-
ModiLoader Second Stage
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
TsarBomba.exe
-
Size
25.2MB
-
MD5
91025d6f02e542f2e37ffce7d0ce8b51
-
SHA1
e2d80ef6075556cd23ce0445473c061f200b5dd4
-
SHA256
3755718db9d33f4aba2563de454d4530a308b41b1096c904102d08e2101f2020
-
SHA512
09c6d7f8b64c75e963d63ad1478a81f567182a948d652346f1c68d233efead615703aadb4ce9cd5e5fd7235089f2439e9153231ea3e1a2c677ae84aec29afc89
-
SSDEEP
393216:NVn+SLSF5pdHn2AXUCITkkkkkrkkkkkkkkkkkk6lX0wfGtbYTZb08MQUCITkkkkS:PduvnNG0shAQ31qnMb5OM9Tt
Score10/10ades_stealerchaoscobaltstrikedcratdiscordratdragonforcegcleanergh0stratlockbitmassloggermodiloaderonlyloggerredlinerokratsectopratumbralvidarvipkeyloggerxoristxworm158fdd2a4f5abb978509580715e5353f987654321cheataspackv2backdoorcredential_accesscryptonedefense_evasiondiscoveryexecutionimpactinfostealerkeyloggerloaderpackerpersistenceransomwareratrootkitspywarestealertrojan-
Ades_stealer family
-
Chaos Ransomware
-
Chaos family
-
Cobaltstrike family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Rokrat payload
-
Detect Umbral payload
-
Detect Vidar Stealer
-
Detect Xworm Payload
-
Detected Xorist Ransomware
-
Detects AdesStealer
-
Discordrat family
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Gcleaner family
-
Gh0st RAT payload
-
Gh0strat family
-
Lockbit family
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Masslogger family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Onlylogger family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Rokrat family
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
SectopRAT payload
-
Sectoprat family
-
Umbral family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vidar family
-
Vipkeylogger family
-
Xorist family
-
Xworm family
-
DCRat payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
ModiLoader Second Stage
-
OnlyLogger payload
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
-
-
Target
setup_x86_x64_install.exe
-
Size
3.5MB
-
MD5
fa2441ccd5d677b471a8d0c0b0436770
-
SHA1
88409a1a9bef3d372289ed2b58187789aba58e0e
-
SHA256
bd3791c8832bbcf0d4a88cb45a45628b44f9de773243109bd7b3dd0b2d950832
-
SHA512
afea757b6965cbf533a6af965e388e38eb63a4d4a8eb4e1b80a8400e88746e690f0f9eb7b37ebdda1feadc11199aa75c47eb6310cbeedddc90b16c7368f7bb67
-
SSDEEP
98304:y28y/bgumqItruMIdiSJvDQ6xgdKjrAr/W9:y2Tgumqy1AikP13D
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Vidar family
-
OnlyLogger payload
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
-
-
Target
setup_installer.exe
-
Size
3.5MB
-
MD5
091e1f011b8b7f7cad3b8c5da34b6f1c
-
SHA1
2b69f901aceee32731309b67c0ebfd95e276ad34
-
SHA256
7eaca01fcbf91db047d9f5acbc2d192e396400919e6c33bcbb5076580e62554c
-
SHA512
c8da9f981b2104f578903feab3c98086dbc43b72132e2268e4f821d355dc6819025b6692718412d329c1812dd2d241582ed2ff7c943e4ec3fe81c0f306e10d04
-
SSDEEP
98304:xWCvLUBsgXr1AL/Hf1OjWrbUwDVe5ie3x7Qxw:xfLUCgXr1UffMWhe5l3xP
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Vidar family
-
OnlyLogger payload
-
Vidar Stealer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
3PowerShell
3Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
2File Deletion
2Modify Authentication Process
1Modify Registry
8Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
6Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1