General
-
Target
32e0122dad63952604a78254ac586a40f112ab911bc4fd47ac66e927343652aa
-
Size
7.9MB
-
Sample
220620-fb8r5ahbc9
-
MD5
7f5134f20060ec9dcb46b5ca314dde97
-
SHA1
912ae6994a1dc6e330cebfe8a2a1c4475a98d248
-
SHA256
32e0122dad63952604a78254ac586a40f112ab911bc4fd47ac66e927343652aa
-
SHA512
cb4fcf0f952b207d22ef2ed06dcb608901449227862a827faf90c9d68efc1957ac9248235adbd109f49a5d4b3d641908b356e4a335520c3c1eb0e16623763017
Static task
static1
Behavioral task
behavioral1
Sample
32e0122dad63952604a78254ac586a40f112ab911bc4fd47ac66e927343652aa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
32e0122dad63952604a78254ac586a40f112ab911bc4fd47ac66e927343652aa.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
vidar
38.1
827
https://api.faceit.com/core/v1/nicknames/xeronxik123
-
profile_id
827
Extracted
redline
3424565
lordliness.store:40355
razorless-shaving.store:40355
fugicarfc8.store:40355
Extracted
redline
newserver2
91.214.124.106:80
Targets
-
-
Target
32e0122dad63952604a78254ac586a40f112ab911bc4fd47ac66e927343652aa
-
Size
7.9MB
-
MD5
7f5134f20060ec9dcb46b5ca314dde97
-
SHA1
912ae6994a1dc6e330cebfe8a2a1c4475a98d248
-
SHA256
32e0122dad63952604a78254ac586a40f112ab911bc4fd47ac66e927343652aa
-
SHA512
cb4fcf0f952b207d22ef2ed06dcb608901449227862a827faf90c9d68efc1957ac9248235adbd109f49a5d4b3d641908b356e4a335520c3c1eb0e16623763017
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Nirsoft
-
Vidar Stealer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-