General
-
Target
BB483E0CB23EAF8FAAA78E28B5899211.exe
-
Size
2.5MB
-
Sample
211114-hgcyragab2
-
MD5
bb483e0cb23eaf8faaa78e28b5899211
-
SHA1
80d17f4bb56fd99c557fbe72debe057bbf54c7f9
-
SHA256
4a0f711887436496355320a602ea4141f5fceed48cb960e638d9daaee70dd077
-
SHA512
be11b7de917665c1c9f993025e1960f95c3dd03c7ce8146bdc5b4038efbd9a52104780681fdaf6f3d70be8f7c717eeabafb964364b422ed15b4e9add79cc754f
Static task
static1
Behavioral task
behavioral1
Sample
BB483E0CB23EAF8FAAA78E28B5899211.exe
Resource
win7-en-20211104
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.ngrok.io:11722
aadcb7aa3c0523a52c6ea2a71565f2d7
-
reg_key
aadcb7aa3c0523a52c6ea2a71565f2d7
-
splitter
|'|'|
Extracted
redline
@xxtrez
178.20.41.235:41993
Targets
-
-
Target
BB483E0CB23EAF8FAAA78E28B5899211.exe
-
Size
2.5MB
-
MD5
bb483e0cb23eaf8faaa78e28b5899211
-
SHA1
80d17f4bb56fd99c557fbe72debe057bbf54c7f9
-
SHA256
4a0f711887436496355320a602ea4141f5fceed48cb960e638d9daaee70dd077
-
SHA512
be11b7de917665c1c9f993025e1960f95c3dd03c7ce8146bdc5b4038efbd9a52104780681fdaf6f3d70be8f7c717eeabafb964364b422ed15b4e9add79cc754f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-