General
-
Target
E3387D3F62414FB262DA20E54D5775A647443B88CD8A0.exe
-
Size
3.7MB
-
Sample
220516-mvh45sggb2
-
MD5
1d31d98bb67d56dfc57dee908cb90187
-
SHA1
0856cef58fdd7a2c02952f36df97310efb5e560b
-
SHA256
e3387d3f62414fb262da20e54d5775a647443b88cd8a0e738cdc488b95477d4e
-
SHA512
e23cdb285da9242eb53a5a3eaf2b5cf40d4c65ae43c62b152c475b2f393e795a3aa55e627788191c83abe8373f7d4edafd5a2c8511e8d38466c9b21f87d919a5
Static task
static1
Malware Config
Extracted
redline
193.106.191.253:4752
178.20.47.241:23253
-
auth_value
6dc858733096320e3d11256c87cea006
Extracted
redline
Cana
176.111.174.254:56328
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Extracted
redline
Ani
detuyaluro.xyz:80
Extracted
redline
Ruzki
193.233.48.58:38989
-
auth_value
80c38cc7772c328c028b0e4f42a3fac6
Extracted
redline
51
193.106.191.182:23196
-
auth_value
21351f5b8358ade7446b0c10ec81735e
Extracted
redline
test1
185.215.113.75:80
-
auth_value
7ab4a4e2eae9eb7ae10f64f68df53bb3
Extracted
redline
SUSHI
65.108.101.231:14648
-
auth_value
26bcdf6ae8358a98f24ebd4bd8ec3714
Extracted
redline
@humus228p
185.215.113.24:15994
-
auth_value
bb99a32fdff98741feb69d524760afae
Targets
-
-
Target
E3387D3F62414FB262DA20E54D5775A647443B88CD8A0.exe
-
Size
3.7MB
-
MD5
1d31d98bb67d56dfc57dee908cb90187
-
SHA1
0856cef58fdd7a2c02952f36df97310efb5e560b
-
SHA256
e3387d3f62414fb262da20e54d5775a647443b88cd8a0e738cdc488b95477d4e
-
SHA512
e23cdb285da9242eb53a5a3eaf2b5cf40d4c65ae43c62b152c475b2f393e795a3aa55e627788191c83abe8373f7d4edafd5a2c8511e8d38466c9b21f87d919a5
-
Detected Djvu ransomware
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-