Overview
overview
10Static
static
50x00060000...27.exe
windows7-x64
100x00060000...27.exe
windows10-1703-x64
100x00060000...27.exe
windows10-2004-x64
50x00060000...82.exe
windows7-x64
100x00060000...82.exe
windows10-1703-x64
100x00060000...82.exe
windows10-2004-x64
100x00070000...78.exe
windows7-x64
60x00070000...78.exe
windows10-1703-x64
60x00070000...78.exe
windows10-2004-x64
60x00070000...48.exe
windows7-x64
100x00070000...48.exe
windows10-1703-x64
100x00070000...48.exe
windows10-2004-x64
100x00070000...20.exe
windows7-x64
100x00070000...20.exe
windows10-1703-x64
100x00070000...20.exe
windows10-2004-x64
10General
-
Target
forc.exe_pw_infected.zip
-
Size
1.6MB
-
Sample
231111-3atyxaca2y
-
MD5
092f3dcdf8515813daf31c984d67b298
-
SHA1
3edc5abd58bc6aedca364cc403dbf223bed987b0
-
SHA256
0b97349ab62a3582989a397e3bfb760fac9a40c9b1ccd66762becaa4fe9f6240
-
SHA512
7bdccc578bc622c8150792c7311f227fca5166b2b59689e5aab91256e49ce0d0635831239ccb9559c49a995e2b04726cadcd35be6734a4be0f087197358f8eb0
-
SSDEEP
49152:FRMcnNZeT/QYhYHBGPtNsk3BnCbCTMG3Gjd:LM4NYT/QYeBGPjBn4CTMcGR
Static task
static1
Behavioral task
behavioral1
Sample
0x0006000000022d82-27.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
0x0006000000022d82-27.exe
Resource
win10-20231023-en
Behavioral task
behavioral3
Sample
0x0006000000022d82-27.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral4
Sample
0x0006000000022d83-182.exe
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
0x0006000000022d83-182.exe
Resource
win10-20231025-en
Behavioral task
behavioral6
Sample
0x0006000000022d83-182.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
0x0007000000022d5d-278.exe
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
0x0007000000022d5d-278.exe
Resource
win10-20231020-en
Behavioral task
behavioral9
Sample
0x0007000000022d5d-278.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral10
Sample
0x0007000000022d6c-248.exe
Resource
win7-20231020-en
Behavioral task
behavioral11
Sample
0x0007000000022d6c-248.exe
Resource
win10-20231025-en
Behavioral task
behavioral12
Sample
0x0007000000022d6c-248.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
0x0007000000022d7e-20.exe
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
0x0007000000022d7e-20.exe
Resource
win10-20231020-en
Behavioral task
behavioral15
Sample
0x0007000000022d7e-20.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
mystic
http://5.42.92.43/loghub/master
Targets
-
-
Target
0x0006000000022d82-27
-
Size
895KB
-
MD5
966bb61b67f2df4c3aee9c816ccf62f0
-
SHA1
5265091f55f08db3ad6a3444734f3d952da29be5
-
SHA256
568304fbc1788754abb840da009924951af700eaee56cc476808d8c8a1b89a29
-
SHA512
56556645684a3eaf498c85244b7232926ee9c9fefd973d2610d070a0b04dddccac9a5d607d44ec9aee0345c192a0d872f4ddf14292df3cbe0c4d61a7acf1c5b9
-
SSDEEP
12288:jqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaOT2:jqDEvCTbMWu7rQYlBQcBiT6rprG8a22
-
-
-
Target
0x0006000000022d83-182
-
Size
276KB
-
MD5
9da18462094598c8f3aa4362df1c3a11
-
SHA1
8b9babe7903214bb3dd4e6d85dc946f022e51a36
-
SHA256
2e20217dcf30dc1859d7ee61dd1d2432173f955adc59d51587af8e606dbadd7a
-
SHA512
9e526426933e974e533c2de60bb9685b52b82e4e5e5c8466f515a883335e457812ff6e15d5506279a69483fee8004a480c17a76035d84c9aee0a94d7d481cb0b
-
SSDEEP
6144:3KWeIhzyZNGutFgaVg5z2yOht19EvdfcqpD6xqKY/moKavQfKH:3KWewyYBODYFvggdQfK
-
Detect Mystic stealer payload
-
Suspicious use of SetThreadContext
-
-
-
Target
0x0007000000022d5d-278
-
Size
624KB
-
MD5
2686ac4ee184aa7d3828858ca46484da
-
SHA1
3dd1955f6c81bf71d4c5af2be05a45c5642c2294
-
SHA256
89639459a0974d1d066ac1c7721890d4c73198c55952c368264956a56e4f5485
-
SHA512
d10b7d3b297758cb43abc45088b85822a6f479d8262070f5285fcc75e9c1e4b276ff93a4c54b3949aa639112a850477d42294244dd006a0fde11778bc39980a4
-
SSDEEP
12288:PKWewyw2dX0HWhWwTZ56Hfnrn9dQCi8y2hmB9bnjqvcOnMaN2VyK:m02dXHV5GxdQr8ronROnL
Score6/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
-
-
Target
0x0007000000022d6c-248
-
Size
315KB
-
MD5
90f917f67243bc0de6565d04b7659115
-
SHA1
7d7238641a645652dee1616eeaae243ed7222753
-
SHA256
42c8dbd8bbf726eb4e1df943867a71d5fdc33647d0994dd07335f61dfa334bd9
-
SHA512
5b691f850fb1d08d1bebc2ed37a6684a39fb61b52d3f652b37872cea55813ab626d32b545496a7012930c06aa5f1c138ee262a7dfa6b22123f213e4ecfbb9b8c
-
SSDEEP
3072:nBDKjKe4hrdze4XmuWdNa7+XednUeYV+xdSejT7a3u4m66MUlKczDGZ0w6R8QHaD:xKWeIhzyZNGuWj/OTLiR8e/I0WIlKH
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-
-
-
Target
0x0007000000022d7e-20
-
Size
656KB
-
MD5
8bc0ffc145c52a896ed8d8e2f7ca412c
-
SHA1
50d345a2ddc1121fbea5316664ceff4315963bd4
-
SHA256
6d8581f717f7e4d8414d61dca0970e4ce60b987c0f2d3f5aedc015f72bd27232
-
SHA512
27d1ddee77e023238f2d356c47bd6697ed96ec49123cb550e7bb689ce2014b85ae8f5f1fb101517d0b119415bbb8957683c9b6fc8b43d9485b27d7b3aa656167
-
SSDEEP
12288:NMrly90V0NA0H7Gae/4IC50pCCHGN0PLvYMXiYQbDL6q/nVby24F:UyIiaaewIsgCQGIgYDw/A2c
-
Detect Mystic stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-