General
-
Target
archive-240424-09_04_33.rar
-
Size
2.8MB
-
Sample
240424-1k4vraac78
-
MD5
1df6c96761557f51b4adf7f9f11c4e5d
-
SHA1
f06e8f20c94406c8682faf120d8dfcdb85a4caf3
-
SHA256
b1990f2a3293feff29504cbbaf7d89570e40561811d403b2a3482bb5f9657ed8
-
SHA512
795e33cacfdc07bc91954361c04dbd102119207f8850cd5c135dade36786ef374c30a5092ffffed2c697983024774fa4fb3d48a55639bcbce5f9e9e4c8544469
-
SSDEEP
49152:Mm5k/6YvIoutOur/ufwVzJ+aICUwi3wZnrcWtgdjKV+rosKD6PWrMRubEA:Mm5kCAIX7QwH+CZlcugEyorEEWubEA
Malware Config
Extracted
https://dsepc5ud74wta.cloudfront.net/load/th.php
Extracted
https://dsepc5ud74wta.cloudfront.net/load/dl.php?id=425
Extracted
https://dsepc5ud74wta.cloudfront.net/load/dl.php?id=444
Extracted
vidar
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.96:28380
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
setup.exe
-
Size
737.0MB
-
MD5
1ab2fa2a485b12b6a62dc256e5caf388
-
SHA1
39ee02acab790c9127aab5b47915658f2be97d22
-
SHA256
a2a2c5619ac3d9bf610129768d3022d33784112dff11ccfaf2e9d3977f02206a
-
SHA512
36afe500094e88b4002d99e9ce3a14298def1a46efbbbefcad6fcaccebe406a1c995ad279bd4228477106a7b61ed61d2ffd228d7abdf3628342f777fba3eef9b
-
SSDEEP
49152:ekHK08F5Y6JLmcH6o4TaC/h4L12/UGkPDR7EhoOl9Ynvrp4egCtUgJJJIFctC0I:e/F2sLRhkaCgwKMkvrpdtD4G5I
-
Detect Vidar Stealer
-
Detect ZGRat V1
-
Glupteba payload
-
Modifies firewall policy service
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
3Windows Service
3Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
3Virtualization/Sandbox Evasion
1Impair Defenses
1Disable or Modify System Firewall
1Subvert Trust Controls
1Install Root Certificate
1