Overview
overview
10Static
static
10f33535fb28...a7.exe
windows7-x64
10f33535fb28...a7.exe
windows10-2004-x64
10f3476b5441...96.exe
windows7-x64
10f3476b5441...96.exe
windows10-2004-x64
10f479112f0f...e2.msi
windows7-x64
7f479112f0f...e2.msi
windows10-2004-x64
8f64398ee74...a4.exe
windows7-x64
10f64398ee74...a4.exe
windows10-2004-x64
10f672ba8bf0...6f.exe
windows7-x64
10f672ba8bf0...6f.exe
windows10-2004-x64
10f92501ffd4...76.exe
windows7-x64
10f92501ffd4...76.exe
windows10-2004-x64
10fa20559cba...8e.exe
windows7-x64
10fa20559cba...8e.exe
windows10-2004-x64
10fa98feb0fc...05.exe
windows7-x64
7fa98feb0fc...05.exe
windows10-2004-x64
7fb1c133bb4...90.exe
windows7-x64
10fb1c133bb4...90.exe
windows10-2004-x64
10fbce724386...fe.exe
windows7-x64
10fbce724386...fe.exe
windows10-2004-x64
10fc82f1f187...54.exe
windows7-x64
10fc82f1f187...54.exe
windows10-2004-x64
10fd03ea32f5...54.exe
windows7-x64
7fd03ea32f5...54.exe
windows10-2004-x64
7fe21006be0...ea.exe
windows7-x64
10fe21006be0...ea.exe
windows10-2004-x64
10fe53c0822d...00.elf
debian-9-armhf
1fe6b8e0d18...a4.exe
windows7-x64
10fe6b8e0d18...a4.exe
windows10-2004-x64
10ff53a80edb...60.bat
windows7-x64
7ff53a80edb...60.bat
windows10-2004-x64
7ffbd6ffb75...4e.exe
windows7-x64
10General
-
Target
b526ee0de0fac93563730dfd03d7c647f658db2ef54b327a2c8f85e7fab04755
-
Size
10.6MB
-
Sample
231010-qa9yxadf5t
-
MD5
9a0dbb1d696a1256ddddd7c0ce0272c4
-
SHA1
0d9d33243608213e53ed0354072a2155b69ae13a
-
SHA256
b526ee0de0fac93563730dfd03d7c647f658db2ef54b327a2c8f85e7fab04755
-
SHA512
021393656085eb7f3c57e627db3a88e6bed648375db7572e66edc711f5aff07898b2e74802eb7afed2670aaa1d3140813df69432e992bfcec89439171730e30b
-
SSDEEP
196608:pW4+Lbgh/Kcds6UHD0g0rxFnoQcsqdA+fe3pCYA2ZG3yRrZFPvp:pWfg9OD0LgQcsqdAIJ8ZFZ
Behavioral task
behavioral1
Sample
f33535fb2813fbfee8e03ea80d11b1a9007db801ec8b6261277377c35d233ba7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f33535fb2813fbfee8e03ea80d11b1a9007db801ec8b6261277377c35d233ba7.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
f3476b5441c34dfe8ca745464622aea4a00cb1196861a6972d66c38f50b2f096.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
f3476b5441c34dfe8ca745464622aea4a00cb1196861a6972d66c38f50b2f096.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
f479112f0f56f314af5aada9e84225ff60b6d68d2271850a442494205db0e6e2.msi
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
f479112f0f56f314af5aada9e84225ff60b6d68d2271850a442494205db0e6e2.msi
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
f64398ee74ab5760caccfef93c615d537375c92241c15d2ea09fd402138786a4.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
f64398ee74ab5760caccfef93c615d537375c92241c15d2ea09fd402138786a4.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
f672ba8bf05715a07351bf661588fcc42a13f814b4b6c3c9ea3519d35861a86f.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
f672ba8bf05715a07351bf661588fcc42a13f814b4b6c3c9ea3519d35861a86f.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
fa20559cbae909b4b7307dc6dc7a10ecd482af8ff4f2fd588f950185d5695d8e.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
fa20559cbae909b4b7307dc6dc7a10ecd482af8ff4f2fd588f950185d5695d8e.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
fa98feb0fc8ff8b25659427c063181b1d05600900959b0eb4f478a0688d7f105.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
fa98feb0fc8ff8b25659427c063181b1d05600900959b0eb4f478a0688d7f105.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
fb1c133bb4d681619adff92051b62f07da505ca6f15906b4fbb125bd65b1f190.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
fb1c133bb4d681619adff92051b62f07da505ca6f15906b4fbb125bd65b1f190.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
fbce72438627da5767059d2f925ac2a318283149c77cd507a7b82ddb614fc6fe.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
fbce72438627da5767059d2f925ac2a318283149c77cd507a7b82ddb614fc6fe.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
fc82f1f187a911727bd8bac3ab3c8aeba9eec12c9b9445547cf7c56b2097b954.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
fc82f1f187a911727bd8bac3ab3c8aeba9eec12c9b9445547cf7c56b2097b954.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
fd03ea32f520aa57ee6b4e29eedf1c897857f9368933c2bb3367d2016dc27454.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
fd03ea32f520aa57ee6b4e29eedf1c897857f9368933c2bb3367d2016dc27454.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
fe21006be0bc93da7054954bbd0ff37fc8ec20c4bb7984234a900589c2d5cbea.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
fe21006be0bc93da7054954bbd0ff37fc8ec20c4bb7984234a900589c2d5cbea.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
fe53c0822d0b31a92436603f7f1d8892ecc21e43b5524767f83e93f05af0f500.elf
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral28
Sample
fe6b8e0d183bf1cf3105a86efd5d70110afd4a05ddcfc7555bb2053f08812fa4.exe
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
fe6b8e0d183bf1cf3105a86efd5d70110afd4a05ddcfc7555bb2053f08812fa4.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
ff53a80edbe3f726f55d17b3671723ff1a2062b17b30beae33bdb4f173733660.bat
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
ff53a80edbe3f726f55d17b3671723ff1a2062b17b30beae33bdb4f173733660.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
ffbd6ffb75e77b342f3caa7729254ef5dc198c783a78310d74923fd86ce4614e.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
unique28.5
194.169.175.232:45451
Extracted
redline
magia
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
redline
lutyr
77.91.124.55:19071
Extracted
redline
6012068394_99
https://pastebin.com/raw/8baCJyMF
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
lokibot
http://alimatata.topendpower.top/_errorpages/alimatata/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Extracted
tofsee
vanaheim.cn
jotunheim.name
Extracted
Protocol: smtp- Host:
mail.telefoonreparatiebovenkarspel.nl - Port:
587 - Username:
[email protected] - Password:
Madarjan007!
Extracted
redline
smokiez285
194.169.175.232:45451
Extracted
stealc
http://dominiczachary.top
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
f33535fb2813fbfee8e03ea80d11b1a9007db801ec8b6261277377c35d233ba7.exe
-
Size
1.1MB
-
MD5
e2e189e6abd23f63639330d243ef115d
-
SHA1
81dc11ebfa2027b58abb4e36b5bc015a682ab439
-
SHA256
f33535fb2813fbfee8e03ea80d11b1a9007db801ec8b6261277377c35d233ba7
-
SHA512
68bb83206d20862160a448c844df437103f79653ea2be3e24659163fbf35180dd75e2f33f15984f9e30dee320a5c9f1da55fca231fffdb0337d023dc83f59dbd
-
SSDEEP
24576:0yhhl9w7aXBz8kFv8AiqcNlLETzaOEqUjbNXUyBctDX:Dhhl9gaXBz8mv8Ai/NlLETzaODsxB8
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Healer an antivirus disabler dropper
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
f3476b5441c34dfe8ca745464622aea4a00cb1196861a6972d66c38f50b2f096.exe
-
Size
1.2MB
-
MD5
b9fffc3dc1fb552e9f513f07bd2a9074
-
SHA1
7cdd7208a18e436991dfabc7445be5e216ddc954
-
SHA256
f3476b5441c34dfe8ca745464622aea4a00cb1196861a6972d66c38f50b2f096
-
SHA512
c22c6d1c392f416e910cbd0cbb9a4e2916062acb064020adda55765aafebc99a8ad26196e98193d17b95c4a739e7a53d55285eabe0d28ccc4202a3f677753d70
-
SSDEEP
24576:zdm1hgZk90yimqq2k5rGXvFcFsb3nrGs7Vff:Hm90yimf2lNcOp3
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
-
-
Target
f479112f0f56f314af5aada9e84225ff60b6d68d2271850a442494205db0e6e2.msi
-
Size
660KB
-
MD5
8e68a2869daf1ba9eaebf31d2d87973e
-
SHA1
739627919a7d4b972454158911edce0106eb5df0
-
SHA256
f479112f0f56f314af5aada9e84225ff60b6d68d2271850a442494205db0e6e2
-
SHA512
35997befc485f7491e5e0fd0cb50a3e5a2f7111638eeb58d36498f68c48d380d9c08d2d03f8c49cc0300830438550e2fb7fa3ac4f9f1bcede2bcad3f3b14f513
-
SSDEEP
12288:ntvRQ+gjpjegGdo8kgLKxBTi9byLw2wHvHgU3qfrbDW:ntncpVGPkgtyLHw33qjbD
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
f64398ee74ab5760caccfef93c615d537375c92241c15d2ea09fd402138786a4.exe
-
Size
217KB
-
MD5
0b474c6739cbae86839d614d973d161f
-
SHA1
fb4ec82b145060eb3de4e40a37a4889cae2c4cfa
-
SHA256
f64398ee74ab5760caccfef93c615d537375c92241c15d2ea09fd402138786a4
-
SHA512
3e8b5932bb2e135e54b12f5671b6a351bbfad9dd870f257e84b2d4916f341cc7dbd513389e3d0cee73c5af21ebaba91dc0d6597f4a5eae0759cb0dc63cb3f978
-
SSDEEP
3072:THXubBYim17CEys0UazhcMLEvx+RQftVuJfW5+XT7:bubBS7C5s0UAu1vx+REtIhXT
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
f672ba8bf05715a07351bf661588fcc42a13f814b4b6c3c9ea3519d35861a86f.exe
-
Size
461KB
-
MD5
9d388a4fd1967964c6aad56cd03ab084
-
SHA1
5fa3d121998a267301ecafe49e69f97091436488
-
SHA256
f672ba8bf05715a07351bf661588fcc42a13f814b4b6c3c9ea3519d35861a86f
-
SHA512
0f12705317ed212e9f94138f901681a34e5181821a9d80f6881331223c13dda1ac63e28e54175af9e86ffc30ce4cc21aabe30b9af686ff1619c7c92f50a6a05b
-
SSDEEP
12288:vUG+TUnCxfCHyqFVtXusi6Kuf8Dw4dlD4CdMxGp:vUGWUnXyqFVtesH8Dw4dlDv
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
-
-
Target
f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776.exe
-
Size
1.1MB
-
MD5
94154f9dab2359231571870c2cee910f
-
SHA1
cfcc4227bce9540644c7f5a9094da58936cf8d90
-
SHA256
f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776
-
SHA512
da4709298568c0a3d9644ec8ebc594593f62c9fd9d9628627d9df568efb093b47adb851123892cc61a0df68a2d4fce52651a7c9cabd243b12bd5f454ad800fb2
-
SSDEEP
24576:yyLxsNFJJ9KwfheAhWDpPFiYwf5U1w2Kt0vaWeVbjnL9/17+t:Ze1J9KwfheAhWDpPFirU+2LUbjnL9V
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Healer an antivirus disabler dropper
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
fa20559cbae909b4b7307dc6dc7a10ecd482af8ff4f2fd588f950185d5695d8e.exe
-
Size
267KB
-
MD5
b5b23c028151b53aa8cdd25389bfcb4c
-
SHA1
559181d09e2974d190470995ce30aa3c66e5c7f3
-
SHA256
fa20559cbae909b4b7307dc6dc7a10ecd482af8ff4f2fd588f950185d5695d8e
-
SHA512
3cbd0a41f739885409366166d61d17fc03ce930dfd2d8dfd98986ea24efe54b8a97d59983e65dd4cee2f509359fe790acb34e76cc735900a5abf34a65019ebfc
-
SSDEEP
3072:Bsq/q/xNO2JySv3KySTgW6evFbi2UIjfW78ea6PSrrpv8E:uqypA2JySyysu2m8ea6PWa
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
fa98feb0fc8ff8b25659427c063181b1d05600900959b0eb4f478a0688d7f105.exe
-
Size
1.9MB
-
MD5
b0f43da8d5e294f83d9acaeee4023888
-
SHA1
6f050ea88b1f005ebc8a09b385f609214c15d9d7
-
SHA256
fa98feb0fc8ff8b25659427c063181b1d05600900959b0eb4f478a0688d7f105
-
SHA512
b33d2d3e7e38ea32b89d0573321e83090632ec81e684072f5d35f49295e21b1a7ca2d66a9af739f3b3228e78e3c7b8c143c0513371b49a137b4c17eab3aca60d
-
SSDEEP
24576:7LdoWOG0h0DlBtcuRvfxsSc/JgVkmw24kBMM0:2G0h0DdvzQgVkmY
Score7/10-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-
-
-
Target
fb1c133bb4d681619adff92051b62f07da505ca6f15906b4fbb125bd65b1f190.exe
-
Size
575KB
-
MD5
0dffc7074ad574b0748ef8e60a52f068
-
SHA1
6c573e941701381625d10817496632994c83fd11
-
SHA256
fb1c133bb4d681619adff92051b62f07da505ca6f15906b4fbb125bd65b1f190
-
SHA512
0450dfc3562b3484c2482f44e1180e53cf6c6cee2cc93ad8ab6c723c6f7daf08ecc673b046feab6ecf30a5919c6a7a7c288d309f5ef43b585bd6f1e71658661b
-
SSDEEP
12288:b37s93Kd3l4IrCUJQs7pBuguvAAuvjMHIzgzX0cGW:r7s96x+IrClPj9j
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
fbce72438627da5767059d2f925ac2a318283149c77cd507a7b82ddb614fc6fe.exe
-
Size
341KB
-
MD5
2823a053cb3512532ca475cc6eaec825
-
SHA1
2285cf41d7db74d9b25c0005fabae74af816e13c
-
SHA256
fbce72438627da5767059d2f925ac2a318283149c77cd507a7b82ddb614fc6fe
-
SHA512
9472daafaf23a625e9d096e6f37323a5df27c3e017e006ff72a7ec1d75e8bd36c584aa4d3a361df61b2537fd74c0a9892c9d7af913c57b0948eda5eaf1742736
-
SSDEEP
6144:3rqX8nNfwn4Hx/nwR9zHp+ab6yeiN1aLTi:bqXaon4cJ+ab6yes
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
fc82f1f187a911727bd8bac3ab3c8aeba9eec12c9b9445547cf7c56b2097b954.exe
-
Size
1.1MB
-
MD5
8fccb7ed45b5c04c173fdea0f081fedc
-
SHA1
a940c5ea36ecd2c575570954e503ef4f6d0e8b2a
-
SHA256
fc82f1f187a911727bd8bac3ab3c8aeba9eec12c9b9445547cf7c56b2097b954
-
SHA512
9b79ecdc0ab3adf10f14af863eb22d789d6b1b4a9f3ea97ac566df0b88e1258ee689d6ef800b7fd9234401b234f09b7cc089bbfa36f4fc2ecf838872a47b0faf
-
SSDEEP
24576:Lym+8DJlyfnTANqN1ghFp5vJn1Bxo/4kWvMgf:+m+8Dj6nTANqDgrp7n1BSQkgh
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Healer an antivirus disabler dropper
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
-
-
Target
fd03ea32f520aa57ee6b4e29eedf1c897857f9368933c2bb3367d2016dc27454.exe
-
Size
1.2MB
-
MD5
752ea2c2fdc34de9cd8e50b0e35df912
-
SHA1
a4a17fa6922d833f12ad2530a8431cac88b7ae81
-
SHA256
fd03ea32f520aa57ee6b4e29eedf1c897857f9368933c2bb3367d2016dc27454
-
SHA512
69e43fe185c34c9785155a115405f8d54580fccae8146c3272559e6896a1f7eda46384a684ded092109975ce5066c495e6495f7b418463390c2a735bbb50fb14
-
SSDEEP
24576:IcLWn6QUUK3k4ntAL/IDpgpJKHj9UAdOj8XyBzfDWEnGARtby0Bpmz:IcL003lkI1gpJKHBUScR3JyEpo
Score7/10 -
-
-
Target
fe21006be0bc93da7054954bbd0ff37fc8ec20c4bb7984234a900589c2d5cbea.exe
-
Size
217KB
-
MD5
230ff2e809a0df012a0ef6b12c06bb45
-
SHA1
084a7dcee5811e821f89b82f7852b9499aafd715
-
SHA256
fe21006be0bc93da7054954bbd0ff37fc8ec20c4bb7984234a900589c2d5cbea
-
SHA512
7cd672915fd04ea12f817be3659b0c651982993d5a9973483e7120952110278727ea440a0c80210c3870e0020bdbf754204ca2f85fa985860dd13def81767a11
-
SSDEEP
3072:wHXDmRZY5duTJMTE1LkX3G2DpoCtPwIvY2MJlRAH0ev54G2T9K:CDoZbJG2wrPwf2uRO0euG2T
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
fe53c0822d0b31a92436603f7f1d8892ecc21e43b5524767f83e93f05af0f500.elf
-
Size
27KB
-
MD5
546ee4af631a18812816e44e9e66b3bc
-
SHA1
2e3c3c3a28e206918f59c6b85b0c29a233c2aeb4
-
SHA256
fe53c0822d0b31a92436603f7f1d8892ecc21e43b5524767f83e93f05af0f500
-
SHA512
8d0d1dd414e510b5d9230393899529f0f8fd42231e441cdcc123d98a21708c97b06cb9452081545a67f963e510875b8931e3f2b6eed4d098042c2282ba9a9947
-
SSDEEP
768:ljoPOCZ/DkbngYAZa6VvS7P3+T7yH+s3Uozy:jCZIbgvZa6VvSz+fmjzy
Score1/10 -
-
-
Target
fe6b8e0d183bf1cf3105a86efd5d70110afd4a05ddcfc7555bb2053f08812fa4.exe
-
Size
655KB
-
MD5
25d8dc370fae2e2a71b86392f352f479
-
SHA1
d8027a8920844a29aed47a6f22761c8a69f60cfa
-
SHA256
fe6b8e0d183bf1cf3105a86efd5d70110afd4a05ddcfc7555bb2053f08812fa4
-
SHA512
f3a2fdccdd72967ed50d20be8738a3f1438b04434e88dbe3f2788b061a52dc9c285c7996cfa5ace5e47e0ef89b3b92c753d4e34025c5eb5f8a6284caeecfe62f
-
SSDEEP
12288:pt7s9+cf017e6WtXpQjguZKni7EhXlLMt+NsG0atOsFAhAUDLpW:r7s9Tb6epKAi7EhXlPsRSYAq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
ff53a80edbe3f726f55d17b3671723ff1a2062b17b30beae33bdb4f173733660.bat
-
Size
1013KB
-
MD5
356726c6ef766005db80ef2f8c0ace6f
-
SHA1
78aefea292bf9397cc4d4987af6f700da8bfafd2
-
SHA256
ff53a80edbe3f726f55d17b3671723ff1a2062b17b30beae33bdb4f173733660
-
SHA512
75182a0f3c20c4541be7de7df84f1683064c2ed6b8f134e9d3bc8f717ba9d96632fccdd76c243c70ab9ab42c9e327d6a3b12eb712f902117007270d0b1b23548
-
SSDEEP
24576:Vf4Q9sdKUubPFgGuaD13/2pLe/jWw0tyKTo6W:BTbPbEaMEKPW
Score7/10-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
ffbd6ffb75e77b342f3caa7729254ef5dc198c783a78310d74923fd86ce4614e.exe
-
Size
460KB
-
MD5
b3c1420b33a1a4bfa365bf8f07341414
-
SHA1
5eb9b7164bba4dc44cf7dabb422b09dcd37be53e
-
SHA256
ffbd6ffb75e77b342f3caa7729254ef5dc198c783a78310d74923fd86ce4614e
-
SHA512
cda882d4aa85695243827cec2630c8635372cfcc3ef7e28536df0f53be6670dae7f85c4237acdcd91bdb5d7e64312fa39f52e9ce4278bae8ab61a7e2c63bb89e
-
SSDEEP
6144:OwmEmkoh0h78AQWh2OohFAOOO/nqi4inYqfBcd4Qe+kDmYxoWK:OVEmt+h45LwGYjxeTp
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
5Scripting
1