General
-
Target
2022-10-24.zip
-
Size
973.8MB
-
Sample
230720-h97ntsea2y
-
MD5
0523322523fc2607b21cf06ee2c06e2f
-
SHA1
49924c11f7b22dbb1fec51402214a4b62f0c4da0
-
SHA256
3a2e31f2844df5cb91eedbf24c0b93de4b0aa08525f733132c2bce0d7ab81acc
-
SHA512
a6ca6c07ece8ad4f4c832cf40bf35e267bfc56f34d0aa252b2cfdcc75ee7fd2b9aa55b547b849820163ca48bd05c9061c76d80756427950d2e5181ebace1ebae
-
SSDEEP
25165824:cbjDAJklOVFPCJ4jMrhQVzccWZYSXn4yPPGwnSQuw:cbj8Sl66PhncWZYyWw6w
Malware Config
Extracted
gafgyt
185.28.39.15:839
Extracted
irata
https://iuskmmdm.ml
Extracted
mirai
MIRAI
Extracted
mirai
LZRD
Extracted
purecrypter
https://cdn.discordapp.com/attachments/1033689147958902804/1033916196451516516/Njnwwomqhh.bmp
https://cdn.discordapp.com/attachments/1033689147958902804/1033908505989628004/Dfygmnwx.png
http://45.139.105.228/Pinkptlahbx.bmp
https://onedrive.live.com/download?cid=A091E1A18B960958&resid=A091E1A18B960958%21160&authkey=AP6mjbZ6I7me0us
http://185.216.71.120/Dsysssji.bmp
https://onedrive.live.com/download?cid=A091E1A18B960958&resid=A091E1A18B960958%21159&authkey=AFru6OsgFq10mzo
https://onedrive.live.com/download?cid=BD9480D014FE52E5&resid=BD9480D014FE52E5%21322&authkey=AHyzW5kyN2MBgPo
https://fullline.com.my/loader/uploads/Cofucfwmi.bmp
https://onedrive.live.com/download?cid=96F930A16702BA42&resid=96F930A16702BA42%21110&authkey=AMJ1Am8lmlZPVrM
http://41.216.183.235/Ogrogk.jpeg
http://185.216.71.120/Ypvoi.png
https://transfer.sh/get/afXUmU/Uyofoxfltd.jpeg
http://185.216.71.120/Eztxeazszv.png
https://onedrive.live.com/download?cid=A091E1A18B960958&resid=A091E1A18B960958%21165&authkey=AKz2N-2upLtVH0U
http://www.ugr.leszczynskie.net/mapa/Upfhbfhbavc.png
http://185.216.71.120/Yqnvktamyg.png
http://194.180.48.203/Uhprtckm.bmp
http://45.139.105.228/Ittogj.bmp
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
aurora
176.124.220.67:8081
Extracted
rhadamanthys
http://104.161.119.221:8899/live-edge/nft.png
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/sadew1013/
Extracted
mirai
LZRD
Extracted
systembc
95.179.146.128:443
146.70.53.169:443
Extracted
njrat
0.7d
Brouteurs
forthewin.ddns.net:13337
fc4dbf906d35a96ddea0300f5b82bfb3
-
reg_key
fc4dbf906d35a96ddea0300f5b82bfb3
-
splitter
Y262SUCZ4UJJ
Extracted
asyncrat
XSSYE 1.0.8
Default
open.imgov.cn:8443
91e5d29b47a7d36802e6e1151434cd02
-
delay
30
-
install
false
-
install_file
1111game.exe
-
install_folder
%AppData%
Extracted
raccoon
d1d6daf7a5018968dea23d67c142f047
http://5.255.103.158/
Extracted
laplas
clipper.guru
-
api_key
f9ff07c5a5e00d26196b3460b72ad41c90dbd24c7405de597560a9a72e3582dd
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.keefort.com.ec - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@ - Email To:
[email protected]
Extracted
erbium
http://77.73.133.53/cloud/index.php
Extracted
redline
Dozkey
91.212.166.17:47242
-
auth_value
c06f8f31502cdaf6d673db7589189fd5
Extracted
formbook
4.1
g28p
whhmgs.asia
wellmedcaredirect.net
beggarded.com
wtpjiv.site
todo-celulares.com
parkitny.net
43345.top
pro-genie.com
cwdxz.com
cbc-inc.xyz
healthspots.net
rulil.top
pyramidaudit.solutions
k8sb15.live
hempaware.report
usclink.life
stayefs.net
05262.top
shop-izakaya-jin.com
iccworldcupnews.com
lulamail.xyz
dubaistocks.club
royaleyeandearhospital.com
cash-date.biz
hbfcjgj.com
zcx625.fun
compra-venta-autos.online
waltherchen.xyz
asyimpo.xyz
gayxxxporn.info
xn--igvy44d.xn--55qx5d
teaktime.net
aydesign.xyz
hfamq.site
tunayreklam.net
rxof.rest
naturebody.love
elijahelijah.com
lojasiadis.com
amazrsxrszwna.com
realtranzex.com
elelfo3d.fun
fse.community
28369.xyz
minigolfauthority.net
venturebestdeals.click
robeholidayrentals.store
edarva.skin
xikixvtj.work
ecolabspeyua.store
infidelitytoolkit.com
crawfordbayoysterroast.net
adenongel.dentist
appliancegrey.site
ky7769.com
kshd.xyz
ausbonusbets.com
aks.capital
rv8288.xyz
retetelebunicii.com
younginheart.net
ps4controller.net
todotutoriales10.com
boletosdeavionbaratos.com
spartanburgwebdesign.com
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
2022-10-24.zip
-
Size
973.8MB
-
MD5
0523322523fc2607b21cf06ee2c06e2f
-
SHA1
49924c11f7b22dbb1fec51402214a4b62f0c4da0
-
SHA256
3a2e31f2844df5cb91eedbf24c0b93de4b0aa08525f733132c2bce0d7ab81acc
-
SHA512
a6ca6c07ece8ad4f4c832cf40bf35e267bfc56f34d0aa252b2cfdcc75ee7fd2b9aa55b547b849820163ca48bd05c9061c76d80756427950d2e5181ebace1ebae
-
SSDEEP
25165824:cbjDAJklOVFPCJ4jMrhQVzccWZYSXn4yPPGwnSQuw:cbj8Sl66PhncWZYyWw6w
-
Modifies security service
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Formbook payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-