General
-
Target
005bcf051418d05c2750b593278c9fc8.exe
-
Size
6KB
-
Sample
230510-xdkazshg76
-
MD5
005bcf051418d05c2750b593278c9fc8
-
SHA1
3425e499c953eefad59edde4f83e1c04687799c7
-
SHA256
9b6573b930e72d319ef4efa0975ff1b59673f96633a03d5e338bc8d7418418f4
-
SHA512
25faa9966fa531c948c00c2454427220ba79d28230fdac1aec0a5793983d07ff2d71dba0b122bcc5bc24abb1fd18586fe2d4215d796eb9b0ba1d55099538f679
-
SSDEEP
96:MEOIQNVjrXcWD7RtwkYv1X5Yp7svNzNt:MFIojrsWHnwkYv1XyIn
Static task
static1
Behavioral task
behavioral1
Sample
005bcf051418d05c2750b593278c9fc8.exe
Resource
win10-20230220-en
Malware Config
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/o.png
Extracted
systembc
148.251.236.201:443
Extracted
redline
cheat
194.87.151.202:9578
Extracted
redline
06.05 youtube
23.226.129.17:20619
-
auth_value
21645ccdf8187508e3b133b1d80a162e
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
xworm
62.171.178.45:7000
tDbp1EmAkvM7wf10
-
install_file
USB.exe
Extracted
redline
misik
217.196.96.102:4132
-
auth_value
9133827666bc8f4b05339316460b08aa
Extracted
formbook
4.1
mi28
cgbshop.uk
economydriver.africa
sarahmodene.com
keithdevelopment.online
flightswithcrypto.com
lanotte-oro.com
e-organizer.ru
gestiondocs.com
impressivehistory.com
kytziabaringstore.com
artshopvenice.com
centrooncapreta.com
114sn.com
smg-bd.com
alambreszirma.com
buddhaux.agency
sihaiyijia.net
introverts.life
gfaqvi.xyz
cheapestprotein.co.uk
mastersmp.net
phukettourpass.com
dituiyuan.com
jacobsjaunts.com
hushmommy.online
bethanjames.com
istekno.com
mariaassumptaschool.africa
bionicspotight.com
visageconcept.uk
learntor.africa
edukd.com
dentistgames.biz
assolclub.ru
yesziv.online
clip2vil.com
gabrieleofficial.com
tysteelstrapping.com
batmitzvah.rsvp
ezramed.info
eliasn97.com
bob8888888.vip
ancientnewdiet.com
itempit3.com
geraltt.net
hedefdata.xyz
awemagineers.com
firatdogrusoyinsaat.com
ainur.store
empowermentchats.com
17south.co.uk
j2pay.com
74475.uk
pinkshea.co.uk
mangalam.rsvp
efefsucceed.buzz
ezee-shop.com
55ymd.xyz
igmm-mexico.com
lidazhongchou.com
gmatense.com
alcateianyc.com
naijareal.africa
scambios.com
huiki721.com
Extracted
agenttesla
https://api.telegram.org/bot6014676296:AAHxuWZXqY8bUcQ2pv4pgUzoljef3z45sCM/
Targets
-
-
Target
005bcf051418d05c2750b593278c9fc8.exe
-
Size
6KB
-
MD5
005bcf051418d05c2750b593278c9fc8
-
SHA1
3425e499c953eefad59edde4f83e1c04687799c7
-
SHA256
9b6573b930e72d319ef4efa0975ff1b59673f96633a03d5e338bc8d7418418f4
-
SHA512
25faa9966fa531c948c00c2454427220ba79d28230fdac1aec0a5793983d07ff2d71dba0b122bcc5bc24abb1fd18586fe2d4215d796eb9b0ba1d55099538f679
-
SSDEEP
96:MEOIQNVjrXcWD7RtwkYv1X5Yp7svNzNt:MFIojrsWHnwkYv1XyIn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Gh0st RAT payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Formbook payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-