General
-
Target
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5
-
Size
369KB
-
Sample
210623-7qp6s57166
-
MD5
331b8604ba1ee60396d11c0ccd628ebb
-
SHA1
637fde23551e378a3fcbecb64c64b8e51ece23b2
-
SHA256
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5
-
SHA512
c55f673ae5a2c19e75585ef124161d72ac83959e8606e397388271290058f3ea4810a7ec39a00d8053138bf26ea96402e8dbe13bca186ec71fc8257442ec82c6
Static task
static1
Behavioral task
behavioral1
Sample
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5.exe
Resource
win10v20210410
Malware Config
Extracted
redline
185.215.113.50:43919
Extracted
cryptbot
cypgvt32.top
morkyl03.top
-
payload_url
http://dugyly04.top/download.php?file=lv.exe
Extracted
redline
MIX 23.06
185.215.113.17:18597
Targets
-
-
Target
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5
-
Size
369KB
-
MD5
331b8604ba1ee60396d11c0ccd628ebb
-
SHA1
637fde23551e378a3fcbecb64c64b8e51ece23b2
-
SHA256
416e85c0a86fbe8a3e874b3119e208e6003891a34b64dfe4d3c2cc3211fab4f5
-
SHA512
c55f673ae5a2c19e75585ef124161d72ac83959e8606e397388271290058f3ea4810a7ec39a00d8053138bf26ea96402e8dbe13bca186ec71fc8257442ec82c6
-
CryptBot Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-