General
-
Target
e570396eccb821b4660c48beddda189e.bin
-
Size
989KB
-
Sample
230320-b5sksadc81
-
MD5
9102b41d43b848d1898feac72c74b784
-
SHA1
9381d463b4e75d31321aa06b07287b2c7efb888d
-
SHA256
c9ab7e42537a6056ff9642a84239551bb6dca4f39719952ec2d873d912977a63
-
SHA512
923f7e33141a9fcb477c64f1ef24116fd481b8619bac7671cbd5a534509680b4d7741e2d2d3860f0faba494ae83c18fa800acf4619a5ebd69c018708e14a83e1
-
SSDEEP
24576:bBIIW0a/Nh+RszrXwdmYUw1ZFmFSg0uSYj0xE9fWncdUQ05gdZPy:lGaicd9U88F6xYj0xE9f+5Q0WdY
Static task
static1
Behavioral task
behavioral1
Sample
daeac2b1c89403f439acd1737dac2e3023ea37716ece0a3a7d4125520d773857.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
build_main
80.85.156.168:20189
-
auth_value
5e5c9cacc6d168f8ade7fb6419edb114
Extracted
redline
Rocket
95.217.188.21:7283
-
auth_value
0095203c91b01efccf3842dc176e53f2
Targets
-
-
Target
daeac2b1c89403f439acd1737dac2e3023ea37716ece0a3a7d4125520d773857.exe
-
Size
1.0MB
-
MD5
e570396eccb821b4660c48beddda189e
-
SHA1
8dc57d96e954a7e7cb8487832e6b40dd9525b284
-
SHA256
daeac2b1c89403f439acd1737dac2e3023ea37716ece0a3a7d4125520d773857
-
SHA512
f2d1984058a8227f43797ccd9a863ea943d200a41394f086b4e56ca708c3e8bdc59292c41f426640a18239228c0c57c3b93070d8aa0e52f7dbd7e2387dc38831
-
SSDEEP
24576:Dyi6JIQ6tbJ2ml4K4zRH7pYiVzK4XNTWfKC9ZI+pNecHyC:Wi6JH40rH1SezK5Fa
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-