General
-
Target
InstallerExpress_v3v.0u.6s.zip
-
Size
86.4MB
-
Sample
230613-dmpghsfb3z
-
MD5
9c1ef0659dd062ae96c2f65098c0b0c7
-
SHA1
a7505ae8dafeec539386f78745d98d968d989253
-
SHA256
6cb44f3aba5fc33eb96a2aad499902e68f28835ec049786ee5d666ee404efda8
-
SHA512
aee83d99b24b4a2f76f85ccfc10ccc6a6fffaa69c6707902179b8d00aabbc9e7512d847d6c48036630f9fccb9c3fc7d784e6b5abf8667f2377aed0bf2a6f1c10
-
SSDEEP
1572864:3d+H73uMtEscKzHtHyjhFD5swg8YS098Qmgp5Ymz/jMCLNW7nCvmcq/thrW:3cb+qEsjRyt9uPXS3QFpx7PLNW7FZTW
Static task
static1
Behavioral task
behavioral1
Sample
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
@hendrolas
94.142.138.4:80
-
auth_value
71d16d25eddbb4fd3b98070432f1a757
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
-
Size
693.0MB
-
MD5
fb757b3c077ec1976a8079ca0925e330
-
SHA1
a8a3c03094572e007b867b5bb9c26acfb182c509
-
SHA256
f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667
-
SHA512
6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502
-
SSDEEP
1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72
-
Detects Lobshot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-