General
-
Target
AB479D019576EFD4DD391E0BF3FC1BEDB10367E1ECE71.exe
-
Size
2MB
-
Sample
220806-qy359shfe3
-
MD5
b81a72714c586f9b634b059b73da8a3a
-
SHA1
2aad87da256f1b26c40e1243f4ec7ea15c2f4690
-
SHA256
ab479d019576efd4dd391e0bf3fc1bedb10367e1ece7157d609a283873a43645
-
SHA512
07f076ccf6b4174a4c9848795dcd86b59d4f2a6b7ab2827d25ac8b2808dad47c2ca20bf6d712c1b8c6fa17427fbf0648c5e24f13fc066d22c8e3f5752125c56c
Static task
static1
Behavioral task
behavioral1
Sample
AB479D019576EFD4DD391E0BF3FC1BEDB10367E1ECE71.exe
Resource
win7-20220715-en
Malware Config
Extracted
redline
ruzki
193.106.191.165:39482
-
auth_value
71a0558c0eea274a5bd617ea85786884
Extracted
redline
install
31.41.244.109:3590
-
auth_value
eb23a0ca5a38a3bf1eb16b2f08524f35
Extracted
vidar
39.7
933
https://shpak125.tumblr.com/
-
profile_id
933
Targets
-
-
Target
AB479D019576EFD4DD391E0BF3FC1BEDB10367E1ECE71.exe
-
Size
2MB
-
MD5
b81a72714c586f9b634b059b73da8a3a
-
SHA1
2aad87da256f1b26c40e1243f4ec7ea15c2f4690
-
SHA256
ab479d019576efd4dd391e0bf3fc1bedb10367e1ece7157d609a283873a43645
-
SHA512
07f076ccf6b4174a4c9848795dcd86b59d4f2a6b7ab2827d25ac8b2808dad47c2ca20bf6d712c1b8c6fa17427fbf0648c5e24f13fc066d22c8e3f5752125c56c
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-