General
-
Target
5608a119a5da54104852179ed4da981918c94fcae8f786ad31f49b768d88d652
-
Size
704KB
-
Sample
230217-v3nnlaga9v
-
MD5
d33419ae305cc0303587520b324df5c6
-
SHA1
2c06740052fc6091ab7f7db6aa1f763ed95aa27c
-
SHA256
5608a119a5da54104852179ed4da981918c94fcae8f786ad31f49b768d88d652
-
SHA512
0b7502784a287477c5474805a7c39b6799e58c76ca47b2ea449b4121fd638dbe956d0b7c8b2380c6b0b83843abe38d0ec1791d0bf00e5d78efa8f7519ae80e59
-
SSDEEP
12288:iMrHy90ce/EmyZ5/oTkpjkd4vuyTtnIZYcoc9p4YWfDVl884sAVZsiANCP:5yde/+tuQAdJyTtIGczuFBe84foiAEP
Static task
static1
Behavioral task
behavioral1
Sample
5608a119a5da54104852179ed4da981918c94fcae8f786ad31f49b768d88d652.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
furka
193.233.20.17:4139
-
auth_value
46dae41be0c00464bf56eddcc93e1bec
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
amadey
3.66
62.204.41.88/9vdVVVjsw/index.php
Extracted
redline
dubik
193.233.20.17:4139
-
auth_value
05136deb26ad700ca57d43b1de454f46
Extracted
purecrypter
https://miner2.me/Oaofdukyvr.dll
Targets
-
-
Target
5608a119a5da54104852179ed4da981918c94fcae8f786ad31f49b768d88d652
-
Size
704KB
-
MD5
d33419ae305cc0303587520b324df5c6
-
SHA1
2c06740052fc6091ab7f7db6aa1f763ed95aa27c
-
SHA256
5608a119a5da54104852179ed4da981918c94fcae8f786ad31f49b768d88d652
-
SHA512
0b7502784a287477c5474805a7c39b6799e58c76ca47b2ea449b4121fd638dbe956d0b7c8b2380c6b0b83843abe38d0ec1791d0bf00e5d78efa8f7519ae80e59
-
SSDEEP
12288:iMrHy90ce/EmyZ5/oTkpjkd4vuyTtnIZYcoc9p4YWfDVl884sAVZsiANCP:5yde/+tuQAdJyTtIGczuFBe84foiAEP
-
Detects Smokeloader packer
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-