General
-
Target
23ae96501f126d3b38b1bedf18bfbea3.exe
-
Size
6KB
-
Sample
230510-qy4f2agc52
-
MD5
23ae96501f126d3b38b1bedf18bfbea3
-
SHA1
759035391e08aafe8f4f7a4b0005388137b34edc
-
SHA256
e6df2c624182ed1a042693570094f4b73962b0d43ecaffaf5eb045948f3c8f58
-
SHA512
701a0d4b81d648e72dcdc14b3df8c420738c984a9b359a9c8df4fcfb99ba7c7f0c5b0a0f709270c425f29d7b855a5a9c8f87a28f84b1db4d09bb76a9ad0c8f19
-
SSDEEP
48:67lzmldOWI5yAHN39fK0FplFcXJhyPFlL/J3th+kYvd4Yg63gp6cOulavTqXSfbi:YEOIQNVjrXcWD7RtwkYv1Yp7svNzNt
Static task
static1
Behavioral task
behavioral1
Sample
23ae96501f126d3b38b1bedf18bfbea3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
23ae96501f126d3b38b1bedf18bfbea3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
systembc
148.251.236.201:443
Extracted
redline
cheat
194.87.151.202:9578
Extracted
lokibot
http://185.246.220.85/fresh/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
redline
06.05 youtube
23.226.129.17:20619
-
auth_value
21645ccdf8187508e3b133b1d80a162e
Extracted
redline
mauga
217.196.96.102:4132
-
auth_value
36f5411cf117f54076fbbb9ea0631fee
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
agenttesla
https://api.telegram.org/bot6014676296:AAHxuWZXqY8bUcQ2pv4pgUzoljef3z45sCM/
Targets
-
-
Target
23ae96501f126d3b38b1bedf18bfbea3.exe
-
Size
6KB
-
MD5
23ae96501f126d3b38b1bedf18bfbea3
-
SHA1
759035391e08aafe8f4f7a4b0005388137b34edc
-
SHA256
e6df2c624182ed1a042693570094f4b73962b0d43ecaffaf5eb045948f3c8f58
-
SHA512
701a0d4b81d648e72dcdc14b3df8c420738c984a9b359a9c8df4fcfb99ba7c7f0c5b0a0f709270c425f29d7b855a5a9c8f87a28f84b1db4d09bb76a9ad0c8f19
-
SSDEEP
48:67lzmldOWI5yAHN39fK0FplFcXJhyPFlL/J3th+kYvd4Yg63gp6cOulavTqXSfbi:YEOIQNVjrXcWD7RtwkYv1Yp7svNzNt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-