General
-
Target
E945.exe
-
Size
780KB
-
Sample
210926-sdx5mafad3
-
MD5
b2d8e3fc81ee69664d1221439ffd9ee8
-
SHA1
c325fe65f692c8ee023f12f41cbb0663d658b917
-
SHA256
2532854386c2ac90a742a4cb593fa2502f261ff2909444de7415ea175285b89b
-
SHA512
d31b225f989b75c02e09660aa5ec70e6a92b901567c823b38a726ed9735d60df755fbd9f80fb12a34e835253707a3ba8e0318f233b54794e55b79f785287976f
Static task
static1
Behavioral task
behavioral1
Sample
E945.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
E945.exe
Resource
win10v20210408
Malware Config
Extracted
redline
karma
94.103.9.133:39323
Extracted
redline
Bliss
185.237.98.178:62607
Targets
-
-
Target
E945.exe
-
Size
780KB
-
MD5
b2d8e3fc81ee69664d1221439ffd9ee8
-
SHA1
c325fe65f692c8ee023f12f41cbb0663d658b917
-
SHA256
2532854386c2ac90a742a4cb593fa2502f261ff2909444de7415ea175285b89b
-
SHA512
d31b225f989b75c02e09660aa5ec70e6a92b901567c823b38a726ed9735d60df755fbd9f80fb12a34e835253707a3ba8e0318f233b54794e55b79f785287976f
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Chinese Botnet Payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-