General
-
Target
738BC607C1A64D1867103F3F4B6558C89401C539C3442.exe
-
Size
18.6MB
-
Sample
220311-11mleabgd2
-
MD5
926523aad05fb0df30f2a20685f705d4
-
SHA1
67ccae075f8c02609030c77ce6afbe333d911a0c
-
SHA256
738bc607c1a64d1867103f3f4b6558c89401c539c34422d1e7a20fe634828cea
-
SHA512
afef1048c73dd7d25645e4f85105936bef3b6776486810a8d560c5a7adbfb746dd30e69d287b50054dfe3bd0bec8aaafe36d40a13caf5640655d07d4a0c4955a
Static task
static1
Behavioral task
behavioral1
Sample
738BC607C1A64D1867103F3F4B6558C89401C539C3442.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
738BC607C1A64D1867103F3F4B6558C89401C539C3442.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
socelars
http://www.wgqpw.com/
Extracted
http://62.204.41.71/cs/SkyDrive.oo
Extracted
http://62.204.41.71/cs/RED.oo
Extracted
http://62.204.41.71/Offer/Offer.oo
Extracted
http://62.204.41.71/cs/Fax.oo
Extracted
redline
@Tui
185.215.113.44:23759
-
auth_value
f4763503fd39f2719d3cbb75871d93ad
Extracted
raccoon
Extracted
amadey
2.85
185.215.113.35/d2VxjasuwS/index.php
Extracted
redline
user1
23.88.118.113:23817
-
auth_value
8fa01dd66c262df9908a74caff781e02
Extracted
redline
media7newtest
65.108.69.168:16278
-
auth_value
4606545ff99a568149814aa95592386f
Extracted
raccoon
1.8.3-hotfix
4da27d123a577c68e42716053343dd3f8da508a2
-
url4cnc
http://91.219.236.27/borderxra
http://94.158.245.167/borderxra
http://185.163.204.216/borderxra
http://185.225.19.238/borderxra
http://185.163.204.218/borderxra
https://t.me/borderxra
Extracted
redline
traf
194.62.105.57:46625
-
auth_value
81954a1cbb71df8cdf16319449781191
Targets
-
-
Target
738BC607C1A64D1867103F3F4B6558C89401C539C3442.exe
-
Size
18.6MB
-
MD5
926523aad05fb0df30f2a20685f705d4
-
SHA1
67ccae075f8c02609030c77ce6afbe333d911a0c
-
SHA256
738bc607c1a64d1867103f3f4b6558c89401c539c34422d1e7a20fe634828cea
-
SHA512
afef1048c73dd7d25645e4f85105936bef3b6776486810a8d560c5a7adbfb746dd30e69d287b50054dfe3bd0bec8aaafe36d40a13caf5640655d07d4a0c4955a
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Socelars Payload
-
LoaderBot executable
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
OnlyLogger Payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-