General
-
Target
18b8eaaca17c55a378a88b6767b14d7c.exe
-
Size
199KB
-
Sample
230309-xhgewsbd41
-
MD5
18b8eaaca17c55a378a88b6767b14d7c
-
SHA1
cc3b16b0cee1476790ace32097d7a5e903d3ee50
-
SHA256
a591e8d5b6ebe119919fe949d09e56224547f0cc511f21244c7cf77447e1f071
-
SHA512
d193e675688a43bc3caad08ea7e3b58d40f7eca01ee562ab213915f76a3ea245b4b168fb19c15523cceee937b428a147d8537e80d11a881e0cd8be13750a2fa6
-
SSDEEP
3072:VzMkEejtozYaGKfYE7VcCAZXiLF6nzL6LHVLKs+qb6jNXlwZA8a00f:VzpEQ+soAEpcCAZXiLF6zL6NPkwer
Behavioral task
behavioral1
Sample
18b8eaaca17c55a378a88b6767b14d7c.exe
Resource
win7-20230220-en
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://95.214.27.203:8080/upload/wrapper.exe
http://95.214.27.203:8080/upload/oigmre.exe,http://95.214.27.203:8080/upload/handler.exe
Extracted
redline
new1
85.31.46.182:12767
Targets
-
-
Target
18b8eaaca17c55a378a88b6767b14d7c.exe
-
Size
199KB
-
MD5
18b8eaaca17c55a378a88b6767b14d7c
-
SHA1
cc3b16b0cee1476790ace32097d7a5e903d3ee50
-
SHA256
a591e8d5b6ebe119919fe949d09e56224547f0cc511f21244c7cf77447e1f071
-
SHA512
d193e675688a43bc3caad08ea7e3b58d40f7eca01ee562ab213915f76a3ea245b4b168fb19c15523cceee937b428a147d8537e80d11a881e0cd8be13750a2fa6
-
SSDEEP
3072:VzMkEejtozYaGKfYE7VcCAZXiLF6nzL6LHVLKs+qb6jNXlwZA8a00f:VzpEQ+soAEpcCAZXiLF6zL6NPkwer
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-