General
-
Target
setup.exe
-
Size
1.1MB
-
Sample
230418-akggcagf78
-
MD5
74ef7f65c21d4b23e4dc6d02373e90bd
-
SHA1
09863be069742b44078f4a5cc2aa2a434b3dd3b3
-
SHA256
a8243ba0bb55b3755468d7b71f534ef914158b339b0896ad11111c303e49e8f6
-
SHA512
ddf73fe20f81ba56b267a78297cf3bf295ca4b8875f555d52a6af7f2d59ad631b160a61d96ddc2a390289a52b58e8b1922120ea04a08cb4b91c32de60465ec1b
-
SSDEEP
24576:iyEmYm/ah6ELVAZQP4YzUSHBYPorN+s0Pp:Jpt0HZACP4nuBFrQlP
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
MrPenguin
86.38.225.74:16808
Extracted
redline
Ghostworker
127.0.0.1:54130
Extracted
icarusstealer
5.75.162.221
-
payload_url
http://193.31.116.239/crypt/public/Update_Downloads/patata.jpg
Targets
-
-
Target
setup.exe
-
Size
1.1MB
-
MD5
74ef7f65c21d4b23e4dc6d02373e90bd
-
SHA1
09863be069742b44078f4a5cc2aa2a434b3dd3b3
-
SHA256
a8243ba0bb55b3755468d7b71f534ef914158b339b0896ad11111c303e49e8f6
-
SHA512
ddf73fe20f81ba56b267a78297cf3bf295ca4b8875f555d52a6af7f2d59ad631b160a61d96ddc2a390289a52b58e8b1922120ea04a08cb4b91c32de60465ec1b
-
SSDEEP
24576:iyEmYm/ah6ELVAZQP4YzUSHBYPorN+s0Pp:Jpt0HZACP4nuBFrQlP
-
IcarusStealer
Icarus is a modular stealer written in C# First adverts in July 2022.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-