General
-
Target
a5aa46c459139311f5e0418a75cc4b44fee49c318ef9632785b048fe704db127
-
Size
930KB
-
Sample
230410-s9k5yaed44
-
MD5
c22fff4be6eb2a6236aa321686bed88b
-
SHA1
6b2b08c19b2ff9967982161b090e12060ed290f9
-
SHA256
fd79c131db0c133e3e2ce4243bfa4ed09b43bf6e096b8b166e9be56c0c81bcb1
-
SHA512
afb0c4db5ce1d83ae41adf5cefe2b2a1ea556f5410798842371d33311958bf305e45ae680036bd49269dcd3cad285e5b0344f6fdf70c03a4e871352fe69045ee
-
SSDEEP
24576:3ymNvJxWocM5Ohe7FFdxdsysotlAJWzMrBrH:CCRgsOyF7tkxBrH
Static task
static1
Behavioral task
behavioral1
Sample
a5aa46c459139311f5e0418a75cc4b44fee49c318ef9632785b048fe704db127.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
lego
176.113.115.145:4125
-
auth_value
5631ccac2c71d49629a3877d1a8ad354
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Extracted
redline
Hoàng
199.115.193.116:11300
-
auth_value
da68f18ceccfa4d998c65572ae1f9575
Extracted
redline
0409Lucky-bot
135.181.101.75:33666
Targets
-
-
Target
a5aa46c459139311f5e0418a75cc4b44fee49c318ef9632785b048fe704db127
-
Size
974KB
-
MD5
f45e700680e5ea2f5a3cb42e4640063b
-
SHA1
32d99a3c74a41086f9435361662cf0ac538cae4a
-
SHA256
a5aa46c459139311f5e0418a75cc4b44fee49c318ef9632785b048fe704db127
-
SHA512
1b0db1b2a8af487613b68b14fe61e10309c6038b9ae28c29f021526182dd157a9a84cce9c8717356ba9fef9564182dab7b78722e474b84ee3510beb9dd5e00e4
-
SSDEEP
24576:1y8BvnIcMDGReNJFdzaL6o1l61iRM/Br8Bd:QsfAGOJCB1IRBg
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-