General
-
Target
018d19a12466283c16f7aaea7b2b7812.exe
-
Size
455KB
-
Sample
230309-y15e4sbg31
-
MD5
018d19a12466283c16f7aaea7b2b7812
-
SHA1
b38b014298d82317fe5fa9ebfde8fc104d37f314
-
SHA256
2ceba6add1d1561f25fb3755098b4340e218ec091a3be5b2d60ab76ebb33672c
-
SHA512
93906134a3705340fee3702a21e93ff3d86d0bdec5c408ffbbd836c7a939cddb6a9e570779f92c4b890d91f884d6f0c63c3453a2545eb20ecfaea3b90e744473
-
SSDEEP
12288:643VLt7DJqNbDtgKcPzqIQNVVtgyqk2deoP14Do:6qVZ3WbDtiedgyqk2dj9L
Behavioral task
behavioral1
Sample
018d19a12466283c16f7aaea7b2b7812.exe
Resource
win7-20230220-en
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://95.214.27.203:8080/upload/wrapper.exe
http://95.214.27.203:8080/upload/oigmre.exe,http://95.214.27.203:8080/upload/handler.exe
Extracted
redline
new1
85.31.46.182:12767
Targets
-
-
Target
018d19a12466283c16f7aaea7b2b7812.exe
-
Size
455KB
-
MD5
018d19a12466283c16f7aaea7b2b7812
-
SHA1
b38b014298d82317fe5fa9ebfde8fc104d37f314
-
SHA256
2ceba6add1d1561f25fb3755098b4340e218ec091a3be5b2d60ab76ebb33672c
-
SHA512
93906134a3705340fee3702a21e93ff3d86d0bdec5c408ffbbd836c7a939cddb6a9e570779f92c4b890d91f884d6f0c63c3453a2545eb20ecfaea3b90e744473
-
SSDEEP
12288:643VLt7DJqNbDtgKcPzqIQNVVtgyqk2deoP14Do:6qVZ3WbDtiedgyqk2dj9L
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Suspicious use of SetThreadContext
-