General
-
Target
1.exeuleyreca
-
Size
4.5MB
-
Sample
220416-f54ehaehh9
-
MD5
aa8c93ab20cfef18702def0d25f24e02
-
SHA1
0c4e91e9ef40aeb853a114864bd6b32c58149244
-
SHA256
a802666a7b608a22383ea018c727793e0541bbe57de2fd85d1214e2b91b1054c
-
SHA512
281c9b6f37bc3e37aabef621c483ce523bff739e03a3cceb88c90738195872b5cda54e9f27f3f7b4023c6aa70a92ca38d59167a6078a7610401c97337895501b
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
redline
104.244.76.137:4487
-
auth_value
67c42657a2dc51f3323efd90a04a2b03
Targets
-
-
Target
1.exeuleyreca
-
Size
4.5MB
-
MD5
aa8c93ab20cfef18702def0d25f24e02
-
SHA1
0c4e91e9ef40aeb853a114864bd6b32c58149244
-
SHA256
a802666a7b608a22383ea018c727793e0541bbe57de2fd85d1214e2b91b1054c
-
SHA512
281c9b6f37bc3e37aabef621c483ce523bff739e03a3cceb88c90738195872b5cda54e9f27f3f7b4023c6aa70a92ca38d59167a6078a7610401c97337895501b
Score10/10-
PhoenixStealer
PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-