General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
redline
roblox
18.133.225.113:32432
Extracted
formbook
4.1
s27k
barbecue-electrique.info
leaffonly.com
h-two-vision.com
milodongym.com
speakerboxstudios.com
s61wes7t5ak1.xyz
truthistanbul.xyz
noahmarean.com
innova-strategic.com
recetasfaciles.online
williamsburgpartners.com
rdrfa.icu
happyhedgehogpress.com
zielhomefurnishing.store
jscd66.com
totallyvaultworthy.com
hexagongroupusa.com
a990h5ipg0.top
arkamailers.com
eqpmjdcw.click
flippinyourbusiness.com
what-the-foto.com
ouryellowumbrella.com
greenbets.pro
popredlozheniyam.motorcycles
falistik.company
sy-1.top
petesguysgarage.com
geeksquadusa.info
renda-extra.click
boltwhippetunleashed.com
tradingviey.com
experiencia-s12s30.com
iunk.link
farmaciapiquer.com
rocnationstudios.info
maihiendidonghoaphat.com
bbetn.com
bulconsports.com
jiuopsa.xyz
nfkxtuha.click
unlimited-code.pro
jzyoaary.click
drgwfzpd.click
oaljuhani.com
rubywoodproducts.com
notio-apps.online
dkcnd.cyou
supashoppa.com
koooly.com
convertgen.com
amitravel.info
dryeyetreatmentgrfdds.today
innday.info
peoplepersonals.com
foreverenamored.com
welqeustliving.com
chlrlotte.com
livinallard.com
yakmediaagency.xyz
tetoteokinawa.com
dsemoalrf.com
blkfence.com
pineappleloft.com
lizardsullen.com
Targets
-
-
Target
https://bazaar.abuse.ch/browse/
-
Gh0st RAT payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-