General
-
Target
tmp
-
Size
246KB
-
Sample
230111-l8tblaff6w
-
MD5
3eecba3432844005979be2167cd672c2
-
SHA1
81a6e2267bed7b56d3b55ce04c22ddb67c25376b
-
SHA256
33520cb1209409f60c2feb681777e52f315152ff2f14af1c59e7001b0c21f945
-
SHA512
5e9bf92a66d413597a5f398e0f16eb80e52cf524a86210889f97cc27ab9d1c19a8cc9b3a5bdce019e4eca409ec9c908c7328e83b29db51a0d978f1dbd65db169
-
SSDEEP
6144:ZNN2muvegDd73GS1NXZX6zlvKoWFu7u1yi5/KQNvR:LXgZDGSxWl5W6u1yEZ
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
amadey
3.65
62.204.41.151/8vcWxwwx3/index.php
77.73.134.27/8bmdh3Slb2/index.php
Extracted
redline
shura
62.204.41.211:4065
-
auth_value
2f02f1c9ca2536317ad1d99107fe7cf1
Extracted
redline
Na//skopro1111
82.115.223.15:15486
-
auth_value
9e531151215f909c3107ffacf9428c11
Extracted
redline
195.201.30.165:26489
sosharestelen.shop:80
-
auth_value
ccbaec00f636c70edb4c46740e6bb1c9
Extracted
redline
debra
62.204.41.211:4065
-
auth_value
24df232a5a333f96ae6fb8b270fed1ff
Extracted
amadey
3.63
62.204.41.91/8kcnjd3da3/index.php
Extracted
redline
@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)
151.80.89.233:13553
-
auth_value
fbee175162920530e6bf470c8003fa1a
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Extracted
redline
Vix
116.203.68.191:37237
-
auth_value
f635a2be7f155e9f45a51f0b602dad49
Extracted
redline
Sin json
198.37.105.211:44443
-
auth_value
d9118d3342eaa56e58d4e53843b507bc
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/adwwe09/
Targets
-
-
Target
tmp
-
Size
246KB
-
MD5
3eecba3432844005979be2167cd672c2
-
SHA1
81a6e2267bed7b56d3b55ce04c22ddb67c25376b
-
SHA256
33520cb1209409f60c2feb681777e52f315152ff2f14af1c59e7001b0c21f945
-
SHA512
5e9bf92a66d413597a5f398e0f16eb80e52cf524a86210889f97cc27ab9d1c19a8cc9b3a5bdce019e4eca409ec9c908c7328e83b29db51a0d978f1dbd65db169
-
SSDEEP
6144:ZNN2muvegDd73GS1NXZX6zlvKoWFu7u1yi5/KQNvR:LXgZDGSxWl5W6u1yEZ
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Socelars payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-