General
-
Target
transfer.js
-
Size
3KB
-
Sample
230331-3x7taafh4s
-
MD5
df563b8889a28abc0115800b3a26f52e
-
SHA1
6e2fb36fbe2023ad4f437e7b4a40d69acaabcba0
-
SHA256
8f997207451d58f68b271fa61a13b0cc6bf335043f2c458eee17cd577be2959e
-
SHA512
3f463b4f9522127946bd9f79b4aceb62e96f5afd3931fb5eb3c93c08cdc635e22349d524a42a28eecf64ab387f47f3e8d836904ecbaeebb674335c65c3405593
Static task
static1
Behavioral task
behavioral1
Sample
transfer.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.2
b354ae133888f81047933923e33e8d49
https://steamcommunity.com/profiles/76561199489580435
https://t.me/tabootalks
-
profile_id_v2
b354ae133888f81047933923e33e8d49
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79
Extracted
redline
bs7a t5wira
6.tcp.ngrok.io:10240
Targets
-
-
Target
transfer.js
-
Size
3KB
-
MD5
df563b8889a28abc0115800b3a26f52e
-
SHA1
6e2fb36fbe2023ad4f437e7b4a40d69acaabcba0
-
SHA256
8f997207451d58f68b271fa61a13b0cc6bf335043f2c458eee17cd577be2959e
-
SHA512
3f463b4f9522127946bd9f79b4aceb62e96f5afd3931fb5eb3c93c08cdc635e22349d524a42a28eecf64ab387f47f3e8d836904ecbaeebb674335c65c3405593
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-