General
-
Target
054fc48c210ae46d4b6616780f43ea9a.exe
-
Size
166KB
-
Sample
230309-w52hxabc8z
-
MD5
054fc48c210ae46d4b6616780f43ea9a
-
SHA1
c2865c58b28bf544d95cd87c9876c7a78504f4a1
-
SHA256
19e566d1b9e2b4249e1db103f78f1b6dc7a278207f9d4ce5c473c7c3776f29ed
-
SHA512
610fdf31ce7f7ab7b9c8fe259d3fe3a55126b360f2bb2fe6d6e724845a6dd9c660d37eb64628f765275e13d313608c4fe9e8789b0581d19f96412a0a94527826
-
SSDEEP
3072:jedqByd5NSEDtVinRl47FYuqjq9EjtoDSnQ6Xw2f2dsO:pC5NI/ClqjqGoDSnQ6wm2
Behavioral task
behavioral1
Sample
054fc48c210ae46d4b6616780f43ea9a.exe
Resource
win7-20230220-en
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://95.214.27.203:8080/upload/wrapper.exe
http://95.214.27.203:8080/upload/oigmre.exe,http://95.214.27.203:8080/upload/handler.exe
Extracted
redline
new1
85.31.46.182:12767
Targets
-
-
Target
054fc48c210ae46d4b6616780f43ea9a.exe
-
Size
166KB
-
MD5
054fc48c210ae46d4b6616780f43ea9a
-
SHA1
c2865c58b28bf544d95cd87c9876c7a78504f4a1
-
SHA256
19e566d1b9e2b4249e1db103f78f1b6dc7a278207f9d4ce5c473c7c3776f29ed
-
SHA512
610fdf31ce7f7ab7b9c8fe259d3fe3a55126b360f2bb2fe6d6e724845a6dd9c660d37eb64628f765275e13d313608c4fe9e8789b0581d19f96412a0a94527826
-
SSDEEP
3072:jedqByd5NSEDtVinRl47FYuqjq9EjtoDSnQ6Xw2f2dsO:pC5NI/ClqjqGoDSnQ6wm2
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Suspicious use of SetThreadContext
-