General
-
Target
money generator.dat
-
Size
6KB
-
Sample
230511-a76praah88
-
MD5
7487dc64d989f425e6f9423ea010a0cb
-
SHA1
1589c6f4b75968ccd77d4929272d619cdd22b491
-
SHA256
482a4cf3eb221445e7d2b45dff43b565d6c203170313f0fad30aa920f61747ad
-
SHA512
0f83aea200ad6b6a4a268abc793000445202388057afdf76db8d3cf4f9b15f95a13af4edb8d96f12574ca773c626224703293afd6447c84dc172558b7bf305ee
-
SSDEEP
96:NAuz8uzSluz+U2gJahPiDHrtedYfzJ0pkuw5bzNt:yzdlk2xhPiLRedYtokD9
Static task
static1
Behavioral task
behavioral1
Sample
money generator.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
money generator.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/o.png
Extracted
systembc
148.251.236.201:443
Extracted
redline
cheat
194.87.151.202:9578
Extracted
lokibot
http://208.67.105.148/ok/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
redline
06.05 youtube
23.226.129.17:20619
-
auth_value
21645ccdf8187508e3b133b1d80a162e
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Targets
-
-
Target
money generator.dat
-
Size
6KB
-
MD5
7487dc64d989f425e6f9423ea010a0cb
-
SHA1
1589c6f4b75968ccd77d4929272d619cdd22b491
-
SHA256
482a4cf3eb221445e7d2b45dff43b565d6c203170313f0fad30aa920f61747ad
-
SHA512
0f83aea200ad6b6a4a268abc793000445202388057afdf76db8d3cf4f9b15f95a13af4edb8d96f12574ca773c626224703293afd6447c84dc172558b7bf305ee
-
SSDEEP
96:NAuz8uzSluz+U2gJahPiDHrtedYfzJ0pkuw5bzNt:yzdlk2xhPiLRedYtokD9
-
Gh0st RAT payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
StormKitty payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-