General
-
Target
https://anonfiles.com/U9u1T4Wbyd/Luxury_Shield_7.1_rar
-
Sample
230217-3clqbahd9z
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anonfiles.com/U9u1T4Wbyd/Luxury_Shield_7.1_rar
Resource
win10v2004-20221111-en
asyncratredlinesectopratxenarmorcheatcollectiondiscoveryinfostealerpasswordpersistenceratrecoveryspywarestealertrojan
windows10-2004-x64
33 signatures
1800 seconds
Malware Config
Extracted
Family
redline
Botnet
cheat
C2
ekinox.myftp.biz:3081
Targets
-
-
Target
https://anonfiles.com/U9u1T4Wbyd/Luxury_Shield_7.1_rar
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-