General
-
Target
1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe
-
Size
3.2MB
-
Sample
240107-w2h76aceg9
-
MD5
f23a2c6dfaeceefb067b42df7b09c2e5
-
SHA1
77f744dc208d542f438bae3dc97398c769dffc90
-
SHA256
1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2
-
SHA512
9020004b0b77aaf9ee6b6429763c19b7a2360ee06835cb5bed9a1b724241752ac5f1c9013346bf8971d6dd217495e71b59ee423830e13f3c9dc1bdb6cced6028
-
SSDEEP
98304:xQCvLUBsgjDAzKDFW/1+Y6MojWEpww/CPJs:xtLUCg4QFi/olpww/CRs
Static task
static1
Behavioral task
behavioral1
Sample
1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe
Resource
win7-20231215-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
vidar
40.3
706
https://lenko349.tumblr.com/
-
profile_id
706
Extracted
redline
pab777
185.215.113.15:6043
Targets
-
-
Target
1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe
-
Size
3.2MB
-
MD5
f23a2c6dfaeceefb067b42df7b09c2e5
-
SHA1
77f744dc208d542f438bae3dc97398c769dffc90
-
SHA256
1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2
-
SHA512
9020004b0b77aaf9ee6b6429763c19b7a2360ee06835cb5bed9a1b724241752ac5f1c9013346bf8971d6dd217495e71b59ee423830e13f3c9dc1bdb6cced6028
-
SSDEEP
98304:xQCvLUBsgjDAzKDFW/1+Y6MojWEpww/CPJs:xtLUCg4QFi/olpww/CRs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-