General
-
Target
b2e3670b7a2ab39f8e1041e16f9625577eaca98c78885475e7980bf035b493de
-
Size
142KB
-
Sample
220711-lne88sfhgr
-
MD5
3e85958b31c8c7169b58b39287a79e1e
-
SHA1
e9d5d1b642177ef5029b30d01b613f622c45024f
-
SHA256
1ce3f07ac872167d42f329d624182d395020bec54a3d81306f6865d5d35d2729
-
SHA512
93c3d9a8a2da1c3ac402022a748913f395f4d27d2c008402a6f3f64a314d3b704356c4d478a8523e0c753b002935ae92e969a81f4d29e4f16f915f4611e05bb0
Static task
static1
Behavioral task
behavioral1
Sample
b2e3670b7a2ab39f8e1041e16f9625577eaca98c78885475e7980bf035b493de.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b2e3670b7a2ab39f8e1041e16f9625577eaca98c78885475e7980bf035b493de.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Extracted
redline
@mahouny23
194.36.177.26:16686
-
auth_value
1e6a07738976b205f98e69f03924461d
Targets
-
-
Target
b2e3670b7a2ab39f8e1041e16f9625577eaca98c78885475e7980bf035b493de
-
Size
213KB
-
MD5
3299d71662eeafeb7edd52684d2cd389
-
SHA1
2087919eb78e7523f6aacbed32dd3a3b2bd72e73
-
SHA256
b2e3670b7a2ab39f8e1041e16f9625577eaca98c78885475e7980bf035b493de
-
SHA512
3e527ce723d8e1248d835a3eb88d6c6bf2c887cb54eac2de9a0536450b289e3d405b05330854f7207f7eeb345a09d5cebda972ff2538ed5e7dcc5e2f5b81a8f6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
suricata: ET MALWARE Generic gate .php GET with minimal headers
suricata: ET MALWARE Generic gate .php GET with minimal headers
-
suricata: ET MALWARE Observed Zingo/GinzoStealer CnC Domain (nominally .ru in TLS SNI)
suricata: ET MALWARE Observed Zingo/GinzoStealer CnC Domain (nominally .ru in TLS SNI)
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Win32/Colibri Loader Activity
suricata: ET MALWARE Win32/Colibri Loader Activity
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-