General
-
Target
c27159c3ef2eca70dfdb148ab8b7f0bd54464dba6b33437d1a5b41957320f2dd
-
Size
559KB
-
Sample
230803-qw4n1sef2y
-
MD5
0edd091e2448140892af233184924bf5
-
SHA1
754987a26b17659e0d06f55642e54e16a09ff7a9
-
SHA256
c27159c3ef2eca70dfdb148ab8b7f0bd54464dba6b33437d1a5b41957320f2dd
-
SHA512
5bf78dbd3f55760330ff7ba4bfaa0666348de6666262e91740b5690782dfe7357edf9f8ca8ed37547c920c59cc015454a5e6d2446b82c48c57da4a4665a14dfb
-
SSDEEP
12288:qMrMy905SCgJEG7zgyj8sc0+B2ETxADgU:qyz+MgsDcxB7TiDgU
Static task
static1
Behavioral task
behavioral1
Sample
c27159c3ef2eca70dfdb148ab8b7f0bd54464dba6b33437d1a5b41957320f2dd.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Extracted
redline
1112224312
https://pastebin.com/raw/NgsUAPya
Extracted
redline
@oleh_ps
176.123.9.85:16482
-
auth_value
24848220823af15a5e52db502394fad3
Extracted
vidar
5
c2438bb36e46960f59a09a0a267eeb74
https://t.me/versozaline
https://steamcommunity.com/profiles/76561199532186526
-
profile_id_v2
c2438bb36e46960f59a09a0a267eeb74
-
user_agent
Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Extracted
smokeloader
2022
https://anydesk-my.com/faq/
http://anydesk-my.com/faq/
Targets
-
-
Target
c27159c3ef2eca70dfdb148ab8b7f0bd54464dba6b33437d1a5b41957320f2dd
-
Size
559KB
-
MD5
0edd091e2448140892af233184924bf5
-
SHA1
754987a26b17659e0d06f55642e54e16a09ff7a9
-
SHA256
c27159c3ef2eca70dfdb148ab8b7f0bd54464dba6b33437d1a5b41957320f2dd
-
SHA512
5bf78dbd3f55760330ff7ba4bfaa0666348de6666262e91740b5690782dfe7357edf9f8ca8ed37547c920c59cc015454a5e6d2446b82c48c57da4a4665a14dfb
-
SSDEEP
12288:qMrMy905SCgJEG7zgyj8sc0+B2ETxADgU:qyz+MgsDcxB7TiDgU
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1