General
-
Target
RedEngine.exe
-
Size
13.3MB
-
Sample
231128-yg8nescd44
-
MD5
d4fcfca5ccb9392799fa8d81567307a1
-
SHA1
fa5345977385325ae6f58879229504f47fcc0c7b
-
SHA256
714d17f082203236c5c1ab7e65bec424102b67507f29b28623eaf7f63d5a014e
-
SHA512
4a9922a4311de9dc79764c9e1bbbc847050d6b72015788d5645802567b1dc168981e1d202c6d66f370c7ae105b15020c5d285424a9cfe359dccf01b7ce6b9e9e
-
SSDEEP
393216:r8iIE7Yo9+4usnwW+eGQRJ9jo7BGcGt1AzZFNoqN4WTr:x7r9+RowW+e5RJ9MamNWy
Behavioral task
behavioral1
Sample
RedEngine.exe
Resource
win10v2004-20231127-en
Malware Config
Targets
-
-
Target
RedEngine.exe
-
Size
13.3MB
-
MD5
d4fcfca5ccb9392799fa8d81567307a1
-
SHA1
fa5345977385325ae6f58879229504f47fcc0c7b
-
SHA256
714d17f082203236c5c1ab7e65bec424102b67507f29b28623eaf7f63d5a014e
-
SHA512
4a9922a4311de9dc79764c9e1bbbc847050d6b72015788d5645802567b1dc168981e1d202c6d66f370c7ae105b15020c5d285424a9cfe359dccf01b7ce6b9e9e
-
SSDEEP
393216:r8iIE7Yo9+4usnwW+eGQRJ9jo7BGcGt1AzZFNoqN4WTr:x7r9+RowW+e5RJ9MamNWy
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-