General
-
Target
MegaTeam.exe
-
Size
30KB
-
Sample
221118-n9gqasdb9x
-
MD5
867eb3366690a2cd20ea3386c0ce8e82
-
SHA1
54b7e8f0d345e9907e309841490ca4d76807521b
-
SHA256
d1094bd38c1ea44442a040638da874d6ee15d6147ddaa5ada67f3598de545f02
-
SHA512
f98d01c6a13e9c833402178d0ac7f395fb6ee797ab8aa07b375cea5b31e709b083b092d232280878a3f0f90267726d788f23d525c6074143c75253a3622ac539
-
SSDEEP
384:p3O8DHK61imwJpt6CMwBEdE3b9kAI9X+E+eJlLpTvFBcw3eDG8EYjjrU4du:vHKMimkXMYQ/H+E/TLpwEeDGLYjj
Static task
static1
Behavioral task
behavioral1
Sample
MegaTeam.exe
Resource
win10v2004-20220812-de
Malware Config
Extracted
redline
1877
overthinker1877.duckdns.org:60732
Extracted
quasar
2.7.0.0
1877
overthinker1877.duckdns.org:4545
xiBqon3YI4gHicsPTt
-
encryption_key
IshCdNN3oYnjATmMydkq
-
install_name
1877.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Extracted
marsstealer
Default
mars1877.duckdns.org/gate.php
Targets
-
-
Target
MegaTeam.exe
-
Size
30KB
-
MD5
867eb3366690a2cd20ea3386c0ce8e82
-
SHA1
54b7e8f0d345e9907e309841490ca4d76807521b
-
SHA256
d1094bd38c1ea44442a040638da874d6ee15d6147ddaa5ada67f3598de545f02
-
SHA512
f98d01c6a13e9c833402178d0ac7f395fb6ee797ab8aa07b375cea5b31e709b083b092d232280878a3f0f90267726d788f23d525c6074143c75253a3622ac539
-
SSDEEP
384:p3O8DHK61imwJpt6CMwBEdE3b9kAI9X+E+eJlLpTvFBcw3eDG8EYjjrU4du:vHKMimkXMYQ/H+E/TLpwEeDGLYjj
-
Quasar payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-