General
-
Target
https://realddl.com
-
Sample
230325-nfgs7see9z
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://realddl.com
Resource
win10v2004-20230220-en
Malware Config
Extracted
https://endsightconsulting.com/node_modules/acorn/debug2.ps1
Extracted
redline
966987928_99
ninhursag.top:28786
-
auth_value
fbce755e70d55c4e11d24e69c7f9b483
Extracted
redline
82.115.223.46:57672
-
auth_value
cfad2d9ce70c9e4af3e624e5c059405c
Extracted
raccoon
1196de9cec79da84686d34883da05a1e
http://94.142.138.227/
Extracted
raccoon
01ce0bf18c5eb0152a13b2ee5d4d8adc
http://37.220.87.69
http://83.217.11.6
Extracted
azorult
http://domcomp.info/1210776429.php
Targets
-
-
Target
https://realddl.com
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Command and Control
Credential Access
Credentials in Files
5Defense Evasion
Web Service
1Modify Registry
3Install Root Certificate
1Virtualization/Sandbox Evasion
1Discovery
Query Registry
7Remote System Discovery
1Security Software Discovery
1System Information Discovery
7Peripheral Device Discovery
1Execution
Exfiltration
Impact
Service Stop
1Initial Access
Lateral Movement
Persistence
Modify Existing Service
1New Service
1Scheduled Task
1Registry Run Keys / Startup Folder
2Bootkit
1Privilege Escalation