General
-
Target
6779cd6f17fa7536c4490cc6d72a00a0.exe
-
Size
235KB
-
Sample
230122-dklmvafa38
-
MD5
6779cd6f17fa7536c4490cc6d72a00a0
-
SHA1
2976ecc0ecc2800be22fa92868c2173a44e04ee0
-
SHA256
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
-
SHA512
88e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
SSDEEP
6144:eLUoeyDABOdDubDXqgraG0JzSRuVyL+VYjQqgE:elu0LgwJ4uVyaV+J
Behavioral task
behavioral1
Sample
6779cd6f17fa7536c4490cc6d72a00a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6779cd6f17fa7536c4490cc6d72a00a0.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
amadey
3.66
62.204.41.242/9vZbns/index.php
62.204.41.121/ZxhssZx/index.php
sysinternals.wf/9djZdj09/index.php
msedgewebview2.ru/9djZdj09/index.php
allaboutdogstraining.com/9djZdj09/index.php
Extracted
redline
tanos
62.204.41.159:4062
-
auth_value
bcb77cd67cf9918d25e4b6ae210a9305
Extracted
redline
buggy
62.204.41.159:4062
-
auth_value
f3bd7e0e0304fca899cd8bf6146ba4b3
Extracted
redline
temp999
82.115.223.9:15486
-
auth_value
c12cdc1127b45350218306e5550c987e
Extracted
redline
re1
librchichelpai.shop:81
rniwondunuifac.shop:81
-
auth_value
ed3efbb6da2413ddef90855eed83d6fa
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Extracted
redline
@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)
151.80.89.233:13553
-
auth_value
fbee175162920530e6bf470c8003fa1a
Extracted
redline
USA
51.89.199.106:17532
-
auth_value
aba751b988df2fba80def49d4d387792
Extracted
redline
anoNYmoxy
133.130.55.60:24092
-
auth_value
e10c6608b20e74a2f1c64b6d05cde450
Extracted
amadey
3.65
hellomr.observer/7gjD0Vs3d/index.php
researchersgokick.rocks/7gjD0Vs3d/index.php
pleasetake.pictures/7gjD0Vs3d/index.php
Targets
-
-
Target
6779cd6f17fa7536c4490cc6d72a00a0.exe
-
Size
235KB
-
MD5
6779cd6f17fa7536c4490cc6d72a00a0
-
SHA1
2976ecc0ecc2800be22fa92868c2173a44e04ee0
-
SHA256
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
-
SHA512
88e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
SSDEEP
6144:eLUoeyDABOdDubDXqgraG0JzSRuVyL+VYjQqgE:elu0LgwJ4uVyaV+J
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-