Description
This typically indicates the parent process was compromised via an exploit or macro.
3964A1E13D2B3EE0C3C34B50D4785907C3FFD560DC3E4.exe
6MB
220117-ybtmbacae9
678dc8e63902a1aadb46ad4a08de7f1c
d8cb7816fcc2b652df45a8da892d04dd9aa5c45f
3964a1e13d2b3ee0c3c34b50d4785907c3ffd560dc3e4a8b22906893c8db9848
cf97095d22e74462ab5960ae709ecef7e0f47ec3b80ae2c84a72ec6e4b2826164520b38a20c36a7e18da99422bb05d81e9a3aa60201224a020aa31d07eb828f7
Family | socelars |
C2 |
http://www.iyiqian.com/ http://www.hbgents.top/ http://www.rsnzhy.com/ http://www.efxety.top/ |
Family | redline |
Botnet | media26 |
C2 |
91.121.67.60:23325 |
Family | redline |
Botnet | chris |
C2 |
194.104.136.5:46013 |
Family | smokeloader |
Version | 2020 |
C2 |
http://brandyjaggers.com/upload/ http://andbal.com/upload/ http://alotofquotes.com/upload/ http://szpnc.cn/upload/ http://uggeboots.com/upload/ http://100klv.com/upload/ http://rapmusic.at/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Family | redline |
Botnet | pub2 |
C2 |
185.215.113.46:80 |
3964A1E13D2B3EE0C3C34B50D4785907C3FFD560DC3E4.exe
678dc8e63902a1aadb46ad4a08de7f1c
6MB
d8cb7816fcc2b652df45a8da892d04dd9aa5c45f
3964a1e13d2b3ee0c3c34b50d4785907c3ffd560dc3e4a8b22906893c8db9848
cf97095d22e74462ab5960ae709ecef7e0f47ec3b80ae2c84a72ec6e4b2826164520b38a20c36a7e18da99422bb05d81e9a3aa60201224a020aa31d07eb828f7
This typically indicates the parent process was compromised via an exploit or macro.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Detects executables packed with ASPack v2.12-2.42
Looks up country code configured in the registry, likely geofence.
Uses a legitimate IP lookup service to find the infected system's external IP.
AutoIT scripts compiled to PE executables.