General
-
Target
15F4E965344A38B07713363133E6624F72DB10CB29796.exe
-
Size
4MB
-
Sample
220303-yr5dracdd5
-
MD5
0cc27690e2886c785a303112d1480b55
-
SHA1
f4723a92fb1c26fcd2f1cd9e8ce7b4a9c0e4f49b
-
SHA256
15f4e965344a38b07713363133e6624f72db10cb297967e91608eec1020e6b1d
-
SHA512
fbc41abd098997d9394e6f1692de5bac6add35215a03147c6d2a7956274c1cfafd42d364258cc147db074ae610c2a4d9491bad8f2a1f5fee86b50b7c945a334d
Static task
static1
Behavioral task
behavioral1
Sample
15F4E965344A38B07713363133E6624F72DB10CB29796.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
15F4E965344A38B07713363133E6624F72DB10CB29796.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
http://62.204.41.192/-LOD/LOD.exe
Extracted
http://62.204.41.192/-A/AutoRun.oo
Extracted
redline
45.132.1.57:15771
-
auth_value
9d006a439ab657f87bacd7a8c5f366b6
Extracted
redline
pab777
185.215.113.15:6043
Extracted
redline
test
109.248.175.92:30766
-
auth_value
92e419e2bde5b23302f8f16ed7a4adbc
Extracted
redline
MIX2
45.132.1.57:15771
-
auth_value
f5efeb0fa57eb56935fd3ba6d5750a9d
Extracted
djvu
http://fuyt.org/test3/get.php
-
extension
.qbaa
-
offline_id
rpx4UUTYZiAR5omq187UvM233jloVHyJUkA8s3t1
-
payload_url
http://zerit.top/dl/build2.exe
http://fuyt.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-G76puQlxBn Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@sysmail.ch Reserve e-mail address to contact us: helprestoremanager@airmail.cc Your personal ID: 0412Jsfkjn
Extracted
redline
ruzki (check bio)
103.133.111.182:44839
-
auth_value
767fa45398d3ac4a23de20d0480c2b03
Extracted
http://62.204.41.192/-RED/RED.oo
Extracted
http://62.204.41.192/AMSI/ecco.exe
Extracted
http://62.204.41.192/AMSI/css.bat
Extracted
vidar
40.2
706
https://kipriauka.tumblr.com/
-
profile_id
706
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/qwwgh/
Extracted
redline
fullwork1488
91.243.32.165:41754
-
auth_value
a4384deb7b09a3c1c21c6447924c2d9a
Extracted
redline
333333
31.210.20.42:13040
-
auth_value
3efa022bc816f747304fd68e5810bb78
Targets
-
-
Target
15F4E965344A38B07713363133E6624F72DB10CB29796.exe
-
Size
4MB
-
MD5
0cc27690e2886c785a303112d1480b55
-
SHA1
f4723a92fb1c26fcd2f1cd9e8ce7b4a9c0e4f49b
-
SHA256
15f4e965344a38b07713363133e6624f72db10cb297967e91608eec1020e6b1d
-
SHA512
fbc41abd098997d9394e6f1692de5bac6add35215a03147c6d2a7956274c1cfafd42d364258cc147db074ae610c2a4d9491bad8f2a1f5fee86b50b7c945a334d
-
Detected Djvu ransomware
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Socelars Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
OnlyLogger Payload
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-