General
-
Target
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30
-
Size
196KB
-
Sample
240424-k8jxgsgc75
-
MD5
edd7441051bbf509ef1052d9f2a02c8f
-
SHA1
7338ef9ddb0b59228b31c6b7931fae04ace344e8
-
SHA256
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30
-
SHA512
0aa4f2666213b571114cdd56c859200ab34a615cde57e67d142d4522369c74b8d4c37c9c95c97a76b93abbb0795ce698e4a888e646fdd2b05fe80f81da074f93
-
SSDEEP
3072:LhAMBSpVNwpB7/LaX6No7INoSXlb2Q4u3lriJYzr9B/erenNecMnq+ECqmIkk6:LaP+fvLW7IVXliQz3l//3Pyq+RqmI
Static task
static1
Behavioral task
behavioral1
Sample
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe
Resource
win11-20240412-en
Malware Config
Extracted
xworm
127.0.0.1:7000
91.92.252.220:7000
-
Install_directory
%Temp%
-
install_file
mstc.exe
-
telegram
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672
Extracted
redline
IDS
91.92.252.220:9078
Extracted
limerat
bc1q7p5qe345uqww9e4ut3nt08tu2lsgnvfsc40azt
-
aes_key
KILLER
-
antivm
false
-
c2_url
https://pastebin.com/raw/4EtQAvTV
-
delay
3
-
download_payload
false
-
install
true
-
install_name
browser.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30
-
Size
196KB
-
MD5
edd7441051bbf509ef1052d9f2a02c8f
-
SHA1
7338ef9ddb0b59228b31c6b7931fae04ace344e8
-
SHA256
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30
-
SHA512
0aa4f2666213b571114cdd56c859200ab34a615cde57e67d142d4522369c74b8d4c37c9c95c97a76b93abbb0795ce698e4a888e646fdd2b05fe80f81da074f93
-
SSDEEP
3072:LhAMBSpVNwpB7/LaX6No7INoSXlb2Q4u3lriJYzr9B/erenNecMnq+ECqmIkk6:LaP+fvLW7IVXliQz3l//3Pyq+RqmI
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-