Resubmissions
22-11-2023 01:16
231122-bm924she63 105-06-2023 18:52
230605-xja99sag8x 601-06-2023 19:18
230601-x1b8wsgd5x 1001-06-2023 17:57
230601-wjvhgaff56 1001-06-2023 16:56
230601-vfpx5sfd87 601-06-2023 16:38
230601-t5dqqsfc93 1001-06-2023 16:19
230601-tsv49afc46 1001-06-2023 16:10
230601-tmev3sfc22 10General
-
Target
http://34.101.154.50
-
Sample
230601-wjvhgaff56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://34.101.154.50
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\PerfLogs\RyukReadMe.html
ryuk
Extracted
redline
dix
77.91.124.251:19065
-
auth_value
9b544b3d9c88af32e2f5bf8705f9a2fb
Extracted
redline
diza
185.161.248.37:4138
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
http://34.101.154.50
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
XMRig Miner payload
-
Renames multiple (7721) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-