General

  • Target

    Active Stealers.zip

  • Size

    2.0MB

  • MD5

    b2ada3da073edb78931a84122a4fe833

  • SHA1

    ad4654d77fbab44f887b1346f1bcdc48348bff00

  • SHA256

    36b4988cc1d292a25b5f223b928cbb312a313895c61e4c5a6d53c133382d629f

  • SHA512

    4189d09be7bd85d1931744ac4c3b48e9e446cfc7247d036791fb653291b998edc1d9f180953ad7e344d189960b39b8c7ddc7234ece11b6f976e780b47a46423d

  • SSDEEP

    49152:8czCGEcqjUZ2jIYqLJ6yEu+hPyZZYh4xQjpVQlhI37XQLyuoRf:+UwjtqLNEu+hPeZYh4DvdAf

Malware Config

Extracted

Family

redline

Botnet

@cuteblan

C2

109.107.182.211:28913

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Active Stealers.zip
    .zip
  • 28c6a16b95f2ac819fcafd58f2d9cc4462450b4e4a8be2dd028fffc3422acd3c.exe
    .exe windows:4 windows x86


    Code Sign

    Headers

    Sections

  • 6c9177dad31455e38bfb4aab05bc4ba8965e3387cb289ec6661ba6a32df952bb.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections