General
-
Target
9c8697e583e0071d29bc362cdfba1a21.exe
-
Size
337KB
-
Sample
210608-g8wbfcft9j
-
MD5
9c8697e583e0071d29bc362cdfba1a21
-
SHA1
4957e631d8c622ffd64ccb338b0ed2793928f935
-
SHA256
255a309aa4ac9d53e3de0f3247b3388d6376af9efb19f8256fd8d1db5bfb2448
-
SHA512
991633afe078ccdc2328df1a24fe6728592941993696a776b508567579bb8ef0c6f2fa007529ab0eebf0af82503e3d05cb5b5c4eb7aaa1a2bfdbcf12be0be3d4
Static task
static1
Behavioral task
behavioral1
Sample
9c8697e583e0071d29bc362cdfba1a21.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
28198d4512d0cf31c204eddceb4471d79950b588
-
url4cnc
https://tttttt.me/capibar
Extracted
cryptbot
olmjby22.top
mortyl02.top
-
payload_url
http://vamzxy03.top/download.php?file=lv.exe
Extracted
redline
MIX 08.06
185.215.113.17:18597
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
9c8697e583e0071d29bc362cdfba1a21.exe
-
Size
337KB
-
MD5
9c8697e583e0071d29bc362cdfba1a21
-
SHA1
4957e631d8c622ffd64ccb338b0ed2793928f935
-
SHA256
255a309aa4ac9d53e3de0f3247b3388d6376af9efb19f8256fd8d1db5bfb2448
-
SHA512
991633afe078ccdc2328df1a24fe6728592941993696a776b508567579bb8ef0c6f2fa007529ab0eebf0af82503e3d05cb5b5c4eb7aaa1a2bfdbcf12be0be3d4
-
CryptBot Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-