General
-
Target
B00F279B575B3F07A06352A37A378323.exe
-
Size
8KB
-
Sample
210608-17djr9jtt2
-
MD5
b00f279b575b3f07a06352a37a378323
-
SHA1
e314c43e297237cad9173cf65c774f99b56acbfc
-
SHA256
36c1ab5e18f20ba99b86a8f995b83a3909f9d3e8d8d7fd573ac1c4813fd2e31e
-
SHA512
e00b39b0bdcb68583af082a41ec8ff351933519d8942644955327922669d73de52af92f660fd099be19fe9bf947fafa88647da900a95285bcd7eb82092f4e2bb
Static task
static1
Behavioral task
behavioral1
Sample
B00F279B575B3F07A06352A37A378323.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
B00F279B575B3F07A06352A37A378323.exe
Resource
win10v20210408
Malware Config
Extracted
redline
Kolya
195.201.17.219:25524
Extracted
metasploit
windows/single_exec
Extracted
raccoon
28198d4512d0cf31c204eddceb4471d79950b588
-
url4cnc
https://tttttt.me/capibar
Extracted
cryptbot
olmjby22.top
mortyl02.top
-
payload_url
http://vamzxy03.top/download.php?file=lv.exe
Extracted
redline
MIX 08.06
185.215.113.17:18597
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
B00F279B575B3F07A06352A37A378323.exe
-
Size
8KB
-
MD5
b00f279b575b3f07a06352a37a378323
-
SHA1
e314c43e297237cad9173cf65c774f99b56acbfc
-
SHA256
36c1ab5e18f20ba99b86a8f995b83a3909f9d3e8d8d7fd573ac1c4813fd2e31e
-
SHA512
e00b39b0bdcb68583af082a41ec8ff351933519d8942644955327922669d73de52af92f660fd099be19fe9bf947fafa88647da900a95285bcd7eb82092f4e2bb
-
CryptBot Payload
-
Glupteba Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-