General
-
Target
0de4a527e06679ead38bf3250f847729901cab72c9693d7f00e607d04dd6ef71
-
Size
2MB
-
Sample
221130-by58asag2w
-
MD5
bab923da922c592e4138b88a402add32
-
SHA1
5927bed5f9a41a82b6c5b91175ef5bb396a1f17c
-
SHA256
0de4a527e06679ead38bf3250f847729901cab72c9693d7f00e607d04dd6ef71
-
SHA512
6c74a6ab914d4f5474450f223020e49658dca756a7769329ccd23d2560121d212474382541a022533b19d5acb5693d2a2576134aafa47ff1f4ab2aa5088c87b7
-
SSDEEP
49152:VSVJcb9RglAw8js3duEFxNWwKhvzJWNNERSxgNVnJ/hewok+hN6mDKU:VSaIA/stWwkvzJWn+ygNVndhewok+hN3
Behavioral task
behavioral1
Sample
0de4a527e06679ead38bf3250f847729901cab72c9693d7f00e607d04dd6ef71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0de4a527e06679ead38bf3250f847729901cab72c9693d7f00e607d04dd6ef71.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
0de4a527e06679ead38bf3250f847729901cab72c9693d7f00e607d04dd6ef71
-
Size
2MB
-
MD5
bab923da922c592e4138b88a402add32
-
SHA1
5927bed5f9a41a82b6c5b91175ef5bb396a1f17c
-
SHA256
0de4a527e06679ead38bf3250f847729901cab72c9693d7f00e607d04dd6ef71
-
SHA512
6c74a6ab914d4f5474450f223020e49658dca756a7769329ccd23d2560121d212474382541a022533b19d5acb5693d2a2576134aafa47ff1f4ab2aa5088c87b7
-
SSDEEP
49152:VSVJcb9RglAw8js3duEFxNWwKhvzJWNNERSxgNVnJ/hewok+hN6mDKU:VSaIA/stWwkvzJWn+ygNVndhewok+hN3
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation