General
-
Target
Reverse IP 139.exe
-
Size
65KB
-
Sample
221126-xdgj4aac2x
-
MD5
aebccb6c82173c65bcb92a17cc0a6b76
-
SHA1
ca23829349cf46fa0abb339269f714a341992601
-
SHA256
67773b80728645b6449b392fa1c98e5ef675cb9fc6c24ee798f893e00dd3e16b
-
SHA512
7992c3812d52cbd00ba726ec64fcf47be63418213f8cb510ca7e96a7285e633c4874543a826dad3e0938df70cdff14462a3555b80f98671ab245985670332492
-
SSDEEP
1536:NLDm+ON6x73ZUV98VJmlHJ+FjUzIXFoMbaaDohm72QuP:ZDAMD086dAHXhaaMQuP
Static task
static1
Behavioral task
behavioral1
Sample
Reverse IP 139.exe
Resource
win10-20220812-en
Malware Config
Extracted
asyncrat
0.5.7B
Ven0
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
overthinker1877.duckdns.org:6606
overthinker1877.duckdns.org:7707
overthinker1877.duckdns.org:8808
Ven0Mutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Ven0.exe
-
install_folder
%AppData%
Extracted
redline
1877
overthinker1877.duckdns.org:60732
Targets
-
-
Target
Reverse IP 139.exe
-
Size
65KB
-
MD5
aebccb6c82173c65bcb92a17cc0a6b76
-
SHA1
ca23829349cf46fa0abb339269f714a341992601
-
SHA256
67773b80728645b6449b392fa1c98e5ef675cb9fc6c24ee798f893e00dd3e16b
-
SHA512
7992c3812d52cbd00ba726ec64fcf47be63418213f8cb510ca7e96a7285e633c4874543a826dad3e0938df70cdff14462a3555b80f98671ab245985670332492
-
SSDEEP
1536:NLDm+ON6x73ZUV98VJmlHJ+FjUzIXFoMbaaDohm72QuP:ZDAMD086dAHXhaaMQuP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-