General
-
Target
sqatyavkpcidpvwiialfnbdpawluusrm.exe
-
Size
63KB
-
Sample
221106-eyr78accd2
-
MD5
dae21c538a7a4f8294d7e19916be9100
-
SHA1
cea1c44030c6f45243a9408e59f8e43304402438
-
SHA256
3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
-
SHA512
8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
SSDEEP
1536:6hQDnx1Ak32YGbHZCyYaN1bbLwtY3L3VG/tpqKmY7:6hQDnx1Ak32HHZCyP1bbLxL322z
Behavioral task
behavioral1
Sample
sqatyavkpcidpvwiialfnbdpawluusrm.exe
Resource
win7-20220812-en
Malware Config
Extracted
asyncrat
1.0.7 - modded by last
New
nicehash.at:4343
adsasutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
GoogleDriver.exe
-
install_folder
%AppData%
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
005f16f264f006578c55237781f36898
-
install_dir
JavaHelper
-
install_file
Java.exe
-
tor_process
tor
Extracted
redline
cheat
nicehash.at:1338
Targets
-
-
Target
sqatyavkpcidpvwiialfnbdpawluusrm.exe
-
Size
63KB
-
MD5
dae21c538a7a4f8294d7e19916be9100
-
SHA1
cea1c44030c6f45243a9408e59f8e43304402438
-
SHA256
3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
-
SHA512
8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
SSDEEP
1536:6hQDnx1Ak32YGbHZCyYaN1bbLwtY3L3VG/tpqKmY7:6hQDnx1Ak32HHZCyP1bbLxL322z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Async RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-