windows payload sent:
https://www.virustotal.com/gui/file/a9165466ad09f37a2c76b8e144025f0bd9fc739b3f0f16a837e31e278914585d
anyrun
https://app.any.run/tasks/69655b22-3b77-4d1d-94ab-c439dfe38ff2
delivered via:
hxxps[://]nebulard[.]io/_next/install[.]js
install[.]js
filehash search 3d3c0037398f0abbe3cf29ae66b022accfc776ed9005a1df427d82e4bfef6b31
https://urlscan.io/search/#hash:3d3c0037398f0abbe3cf29ae66b022accfc776ed9005a1df427d82e4bfef6b31
image asset:
hxxps[://]nebulard[.]io/prod-assets-parallel-life/images/download_page_bg[.]webp
file_hash:eb853175289bcf0a1197aa75a4525cb74a73d1577ef5a4b5bbdf0808cbe62eb2
https://pro.urlscan.io/triage?query=eb853175289bcf0a1197aa75a4525cb74a73d1577ef5a4b5bbdf0808cbe62eb2
observing variant iteration connected to
domain: claims-parallel[.]life
from 16 days ago
domain standard web3 drainer with control server
domain: drop9-ether[.]ru
https://urlscan.io/search/#domain%3Adrop9-ether.ru
deobfuscation of claims-parallel[.]life
currently showing instance as inferno drainer unit
unique domains:
nebulard[.]io
nebulard[.]app
nebulardgame[.]io
nebulard[.]space
url_mutations:
nebulard[.]io/
nebulard[.]io/install
nebulard[.]app/
nebulardgame[.]io/install
nebulard[.]space/
nebulardgame[.]io/?v=own
nebulard[.]io/?v=nftfree
nebulard[.]io/download
nebulard[.]space/
nebulard[.]io/?v=betavers