General
-
Target
6414859077fe3aa6d35f0c46857f950262d487d4ee5b2d92d59f6e205340a1ee
-
Size
18.0MB
-
Sample
231121-c57v5sbf69
-
MD5
ab572c3d1e6ecab24e20a1f858eb57a1
-
SHA1
76fcdcb011b4edf3f5178ab0e08033d89d628902
-
SHA256
6414859077fe3aa6d35f0c46857f950262d487d4ee5b2d92d59f6e205340a1ee
-
SHA512
7354a60e927ddbf44e47d7febb068b3792ade2a9dd96f6ea07d6bb036fff4eaaf19977649e9784c80ba61d3655598e0d82aed333b2cd9610aa35babfb9a7d7bf
-
SSDEEP
393216:ARFbqnGONtcDEo7nKhgqgLsqpbe9+MxAa+kiUTg5Dqw:ArU13o7ZLsAH5Sdw
Behavioral task
behavioral1
Sample
6414859077fe3aa6d35f0c46857f950262d487d4ee5b2d92d59f6e205340a1ee.exe
Resource
win7-20231020-en
Malware Config
Extracted
https://cdn.discordapp.com/attachments/612689775702573066/894910938065547284/Cert.reg
Extracted
https://cdn.discordapp.com/attachments/612689775702573066/894910945422368798/hivee.exe
Extracted
https://cdn.discordapp.com/attachments/612689775702573066/894910956184961054/BITBACKK.exe
Extracted
https://cdn.discordapp.com/attachments/612689775702573066/897976122757746728/dlscord.exe
Extracted
https://cdn.discordapp.com/attachments/612689775702573066/898655642749915136/Cypher_Rat.exe
Extracted
aurora
37.220.87.13:8081
Extracted
limerat
-
aes_key
123
-
antivm
true
-
c2_url
https://pastebin.com/raw/mchxnAbT
-
delay
80
-
download_payload
false
-
install
true
-
install_name
WindosCert.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Extracted
asyncrat
0.5.7B
NEW
ihouhh
-
delay
80
-
install
true
-
install_file
UpdateChromeDay.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/mchxnAbT
Extracted
redline
185.215.113.69:15544
62.204.41.141:24758
45.15.157.131:36457
-
auth_value
971353143dce4409844e1f4f0f5f7af8
Extracted
redline
@Miroskati
ofriaransim.shop:80
-
auth_value
384ebbf9bd4d7e80bf3269909b298f87
Targets
-
-
Target
6414859077fe3aa6d35f0c46857f950262d487d4ee5b2d92d59f6e205340a1ee
-
Size
18.0MB
-
MD5
ab572c3d1e6ecab24e20a1f858eb57a1
-
SHA1
76fcdcb011b4edf3f5178ab0e08033d89d628902
-
SHA256
6414859077fe3aa6d35f0c46857f950262d487d4ee5b2d92d59f6e205340a1ee
-
SHA512
7354a60e927ddbf44e47d7febb068b3792ade2a9dd96f6ea07d6bb036fff4eaaf19977649e9784c80ba61d3655598e0d82aed333b2cd9610aa35babfb9a7d7bf
-
SSDEEP
393216:ARFbqnGONtcDEo7nKhgqgLsqpbe9+MxAa+kiUTg5Dqw:ArU13o7ZLsAH5Sdw
-
Modifies security service
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-