General
-
Target
sus.zip
-
Size
1KB
-
Sample
230510-3pm4xace8x
-
MD5
f8554227ffb4b19c58f38c459d8929cf
-
SHA1
684a2014816c1c20582e97ab69064f3d4348ba7e
-
SHA256
85c3c3e707c2567bca0e211c6ea81a11e6207ecdc51f49cfd21ebffe8bd503e7
-
SHA512
1ce8e237f7c6f2356554ca13dfaa16ec99baa0b3e12a7b17061f00409c28ba91494ffd9a37123a8d5dd0c913a54d689a7dd9915cc8f971264ea148d307bf15a5
Static task
static1
Behavioral task
behavioral1
Sample
sus.zip
Resource
win10-20230220-en
Malware Config
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/o.png
Extracted
redline
cheat
194.87.151.202:9578
Extracted
systembc
148.251.236.201:443
Extracted
redline
06.05 youtube
23.226.129.17:20619
-
auth_value
21645ccdf8187508e3b133b1d80a162e
Extracted
xworm
62.171.178.45:7000
tDbp1EmAkvM7wf10
-
install_file
USB.exe
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
sus.zip
-
Size
1KB
-
MD5
f8554227ffb4b19c58f38c459d8929cf
-
SHA1
684a2014816c1c20582e97ab69064f3d4348ba7e
-
SHA256
85c3c3e707c2567bca0e211c6ea81a11e6207ecdc51f49cfd21ebffe8bd503e7
-
SHA512
1ce8e237f7c6f2356554ca13dfaa16ec99baa0b3e12a7b17061f00409c28ba91494ffd9a37123a8d5dd0c913a54d689a7dd9915cc8f971264ea148d307bf15a5
-
Gh0st RAT payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-