General
-
Target
39a1f23b47f11d5b3e691fdf901aafea.exe
-
Size
862KB
-
Sample
220905-rg86machc6
-
MD5
39a1f23b47f11d5b3e691fdf901aafea
-
SHA1
cc97907047c8b80321a33630195aa34c9984eeb5
-
SHA256
428b820b1ffe34eb41bb4ff1909f299b90df21e5b41052b0bd283c212f64fef2
-
SHA512
3057c1eaea2e482da6e9b3502ce289ca22bd396fb44fd18a484532472fca24c52c1bde043f5b9e32fe832ba93138f8c0e2295c94d766d9f70822e896846df9c8
-
SSDEEP
12288:Llrs2RbKAlpWE8HS/DmCMJmoA9cDRUkmgc8Wv1tF:ZrUuoE8HCDmNA9cDRUkmgrWv1tF
Static task
static1
Behavioral task
behavioral1
Sample
39a1f23b47f11d5b3e691fdf901aafea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39a1f23b47f11d5b3e691fdf901aafea.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
raccoon
c7ede4e1d38311f89345e94d76fa9d65
http://45.15.156.11/
Extracted
redline
78.24.216.5:42717
-
auth_value
6687e352a0604d495c3851d248ebf06f
Targets
-
-
Target
39a1f23b47f11d5b3e691fdf901aafea.exe
-
Size
862KB
-
MD5
39a1f23b47f11d5b3e691fdf901aafea
-
SHA1
cc97907047c8b80321a33630195aa34c9984eeb5
-
SHA256
428b820b1ffe34eb41bb4ff1909f299b90df21e5b41052b0bd283c212f64fef2
-
SHA512
3057c1eaea2e482da6e9b3502ce289ca22bd396fb44fd18a484532472fca24c52c1bde043f5b9e32fe832ba93138f8c0e2295c94d766d9f70822e896846df9c8
-
SSDEEP
12288:Llrs2RbKAlpWE8HS/DmCMJmoA9cDRUkmgc8Wv1tF:ZrUuoE8HCDmNA9cDRUkmgrWv1tF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-