General
-
Target
Keygen.zip
-
Size
2MB
-
Sample
230622-vbr7psfd93
-
MD5
777982ebb5c620fcaf4c5e86e9aeed47
-
SHA1
9234d27ec1f49e98384e9309f507cd31a9871360
-
SHA256
cbb8f5805487e2d2be102b27efc4d99af9c13abea1705bc12682c15c34850c8e
-
SHA512
041e556cb0a81878891bdc49c87b948dda621e7a6196de210482edeb9655ef0e01eb25cfdeb28286e9fd13cc881c6ae621ef6850a210d2199b9c18cdf486d138
-
SSDEEP
49152:7eodmzLiO0yDPqfHjzAYI2O7SFh/8nv4wbs4KJ7hfSi/od1vh6ze7k4kSRzeLAD:7ecmni2pYI2og/Wfb6lKi/od1vh6zMko
Static task
static1
Behavioral task
behavioral1
Sample
Keygen.exe
Resource
win7-20230621-en
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
vidar
4.4
9f58bcb3813bb0d3c7a7a048ae145e6b
https://steamcommunity.com/profiles/76561199235044780
https://t.me/headlist
-
profile_id_v2
9f58bcb3813bb0d3c7a7a048ae145e6b
-
user_agent
Mozilla/5.0 (Linux; Android 7.0; Pixel C Build/NRD91D; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/53.0.2785.124 Safari/537.36
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Targets
-
-
Target
Keygen.exe
-
Size
3MB
-
MD5
59c32d48277474cbf18676cca36705d1
-
SHA1
0599c381a26c94302d8a8fb4b8dcf2a6a599635b
-
SHA256
cecb3e64aedca4f47e635529713724e71c07de23949e93ab0f211bb82bae63d0
-
SHA512
ecf6d93ae7099c6feb03023d1b5370e2261ff70c8aad797e18f032b1fab7199cb9500b082e8790c8b3b3f2c5b370c79b20012d22acfe26a0cc3ebc87f5f17c8e
-
SSDEEP
98304:cSiMCSdYa4SKNe1bYdM+DidXvh6d204OOR5qj8:NCSe+1bYdtgJ6M8YYQ
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-