General
-
Target
hgty.bin
-
Size
1.6MB
-
Sample
211028-t3fsbagffp
-
MD5
97b1b0eb2864514c1bd17dc2479fd392
-
SHA1
1e0db2c33bac2abf8cf5883f779b0fb34e63d7c7
-
SHA256
7bd1800901f644312525102786765942f63e164618b076d1e9c7d77e8c055e19
-
SHA512
c1940f8b49298f37e2fe23f2ac1fdb35144f09f77d4d58da96f748c78bac2f56f0b90dc19faf02c1a8d3d9992a1b34bb2d2c7c7ec71eab304151c3c843edbc59
Static task
static1
Behavioral task
behavioral1
Sample
hgty.bin.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
hgty.bin.exe
Resource
win10-en-20210920
Malware Config
Extracted
http://xuiklxus.xyz/hfile.bin
Targets
-
-
Target
hgty.bin
-
Size
1.6MB
-
MD5
97b1b0eb2864514c1bd17dc2479fd392
-
SHA1
1e0db2c33bac2abf8cf5883f779b0fb34e63d7c7
-
SHA256
7bd1800901f644312525102786765942f63e164618b076d1e9c7d77e8c055e19
-
SHA512
c1940f8b49298f37e2fe23f2ac1fdb35144f09f77d4d58da96f748c78bac2f56f0b90dc19faf02c1a8d3d9992a1b34bb2d2c7c7ec71eab304151c3c843edbc59
-
Modifies security service
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Likely Evil Macro EXE DL mar 28 2016
suricata: ET MALWARE Likely Evil Macro EXE DL mar 28 2016
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-