General
-
Target
Ccgetmac.Version.3.9.serial.keygen.zip
-
Size
8.9MB
-
Sample
210520-gpjev5vtwj
-
MD5
0ec333589602e1d654dd7812f60d6801
-
SHA1
342d83bcb2fa7891ebb7e92ab0d693ff6d5edbf7
-
SHA256
d224feaccfeca86d5a881c3edfbaaca0c656fc814c1d03111c86737983e6ec53
-
SHA512
04b605f0fe6b5affb142b65c712c1f0767d0a441b20ce0bf815131589e9520fed956c843dd232083287559427ef42a350446de5227f4d7c30d13cb6b5e4d549e
Static task
static1
Behavioral task
behavioral1
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210408
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
redline
ServLyla2
87.251.71.4:80
Extracted
raccoon
e0aa5b6d2491c503baf06d4cfeb218de1cd41474
-
url4cnc
https://tttttt.me/hbackwoods1
Targets
-
-
Target
Ccgetmac.Version.3.9.serial.keygen.exe
-
Size
9.0MB
-
MD5
6fc07da0a519310b03b1f5d848ca327d
-
SHA1
af5271b735669ec632ecf18eca841c5b3fb1c4d0
-
SHA256
47f381ac61e4b5279863c5fbf577a443554044d0ddb5e0c9f22bca25c9c413b3
-
SHA512
f4c846db325768bc90a91e78d63cf1d8cdd12fc2e83853a20d54569927dd4addab75a0d8786400c12e831989408d42d015ac04d0e1fe47aad49f62ce199dbd17
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
XMRig Miner Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of SetThreadContext
-