General
-
Target
http://77.91.68.78/lend
-
Sample
230930-2mhwqshc67
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://77.91.68.78/lend
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
LegendaryInstalls_20230918
62.72.23.19:80
-
auth_value
7e2e28855818d91285389c56372566f4
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
bc1q7lqwyshs9zjpxyhcvwpmfyhad4w7j08qa7yudz
0x0BE5856fBfb983d813E9C8104a9FEE482F9B1b57
Targets
-
-
Target
http://77.91.68.78/lend
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Eternity clipper
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-