General
-
Target
a.bin
-
Size
5KB
-
Sample
230516-wqjpjsba9v
-
MD5
69525fa93fd47eb3c533afe3b1baba48
-
SHA1
3dea1b337987177c73c64e89b370d90dc94c64cb
-
SHA256
8e9c6b72a19705e65d654814d0770a67c7c4a2e52915f6115dc740ab254ed4a9
-
SHA512
909202467de5c96404c154cd3be55643df62c13c395bd6e0406be5834c3a10b953f42cc3520ac5979af754af192260ec737d19892333e5a8dfab79aef9b23182
-
SSDEEP
48:6di2oYDjX9iqhf3FXfkQHjJhyPFlWa8tYDdqIYM/cphuOulavTqXSfbNtm:uNiqp3JkQHyDUtE2WcpisvNzNt
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
PERSOM
176.124.219.192:14487
-
auth_value
0695a610af712a57529526101d7e83b2
Extracted
quasar
1.4.0
X
45.141.27.208:4780
127.0.0.1:4780
d6e77ea9-bff7-4566-b4dd-f1be3c293c5e
-
encryption_key
57F667877C1FCDA6663E2FDAC6FB8CFDE3CEA957
-
install_name
winx.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
winx
-
subdirectory
sys
Extracted
lokibot
http://171.22.30.164/mancho/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
redline
001
185.161.248.172:26464
-
auth_value
74f84f676351018a32a2307c4196a45c
Extracted
formbook
4.1
e8fg
rmaex.xyz
thegreenambition.com
ifmcustomerevents.com
agencewebimage.com
w0a00dbe.buzz
shopbequynhff.com
webpetarung.online
girlgonecyber.com
lexoutwest.com
gramshilpartandcraft.com
kemeioficial.com
track-race-package.com
shop-domanopro.com
bohanshow.com
ateliermedispa.com
paragonhonda-ny.com
calzadosnova.com
thephoenixoneproject.com
pl66380.com
nightowlmarketinggroup.com
justthrillingdeals.com
bodylovebe.com
callaray.com
yp666666.com
astrologerkaranveer.com
newbalance-deutschland.com
cathfrei.com
happytailontrail.com
daihatsumedan.info
botflock.com
jumshow.life
ricolocobikes.com
kdramalike.com
aubedubd.info
getyournewhouse.com
a298c.com
travelswithabhi.com
flsaudiocreate.fun
scenicwirral.com
6a9uxu.com
mysong-yoursong.com
manyen.com
hondohaus.com
player9.stream
36292.win
amazing-channel.ru
superiorcleaners.info
chloezhaang.com
gvihx.com
regenliving.live
thunderbirdai.com
librosfantasia.net
deltacommunitycu-6t.com
optimizedproducts.net
luettig.tech
surfing.gay
tanushreesmakeover.com
liora-hotel.ru
zxl358.com
madeirahotwheels.com
maxlivingjacksonville.com
glowcircuit.com
apartamentoslassirenas.com
elevateyourlifeshop.com
itstopnotch.com
Targets
-
-
Target
a.bin
-
Size
5KB
-
MD5
69525fa93fd47eb3c533afe3b1baba48
-
SHA1
3dea1b337987177c73c64e89b370d90dc94c64cb
-
SHA256
8e9c6b72a19705e65d654814d0770a67c7c4a2e52915f6115dc740ab254ed4a9
-
SHA512
909202467de5c96404c154cd3be55643df62c13c395bd6e0406be5834c3a10b953f42cc3520ac5979af754af192260ec737d19892333e5a8dfab79aef9b23182
-
SSDEEP
48:6di2oYDjX9iqhf3FXfkQHjJhyPFlWa8tYDdqIYM/cphuOulavTqXSfbNtm:uNiqp3JkQHyDUtE2WcpisvNzNt
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Quasar payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Formbook payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1