General
-
Target
a68a2cc4a8b2ad718667b119888e1ce6.exe
-
Size
5.3MB
-
Sample
210904-2w85aaeee5
-
MD5
a68a2cc4a8b2ad718667b119888e1ce6
-
SHA1
716bc67bc233a15b9e49d609df38f446e1c12edb
-
SHA256
6287d0a9d9987e47175885ee55b3fdc4bbdd7fd67204b715ccff57803dd2e316
-
SHA512
5610516de815ed667839738c1a9ba00a44c2fcc5eff9eaf64174edb253ffb0ad02ce464ed8831e65e1e396388614786961b9bd99ff19a87ada7f03b370b3e8d3
Static task
static1
Behavioral task
behavioral1
Sample
a68a2cc4a8b2ad718667b119888e1ce6.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
a68a2cc4a8b2ad718667b119888e1ce6.exe
Resource
win10v20210408
Malware Config
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
redline
pub1
viacetequn.site:80
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
NORMAN3
45.14.49.184:28743
Extracted
vidar
40.4
937
https://romkaxarit.tumblr.com/
-
profile_id
937
Extracted
raccoon
b8ef25fa9e346b7a31e4b6ff160623dd5fed2474
-
url4cnc
https://telete.in/iphbarberleo
Targets
-
-
Target
a68a2cc4a8b2ad718667b119888e1ce6.exe
-
Size
5.3MB
-
MD5
a68a2cc4a8b2ad718667b119888e1ce6
-
SHA1
716bc67bc233a15b9e49d609df38f446e1c12edb
-
SHA256
6287d0a9d9987e47175885ee55b3fdc4bbdd7fd67204b715ccff57803dd2e316
-
SHA512
5610516de815ed667839738c1a9ba00a44c2fcc5eff9eaf64174edb253ffb0ad02ce464ed8831e65e1e396388614786961b9bd99ff19a87ada7f03b370b3e8d3
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
VKeylogger Payload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-