General
-
Target
Cel3ry.rar
-
Size
8.6MB
-
Sample
240425-qa36csba82
-
MD5
f47c25576cee11f1583a3408aaa7f397
-
SHA1
110776172201659e9c0356841b1f1a86855a99db
-
SHA256
32e6b9e623d1f1f49aabfeb97b58636ef3b574b52862b4483a1710717a1a19b4
-
SHA512
8094cf0f082245fd0be551281ac97068bceb62ce3b0335f544772899ae9e3bee5c1fdb60669b217b87708e2789c4f44ee1fa7885dc5af8cb66c093538d132df1
-
SSDEEP
196608:nFjVQQXuXdeSWtnD3cYAmzvl3rhgIPlpSw0Fro9i5Sl:nFjqS7DvRhNPjJ0hiuSl
Behavioral task
behavioral1
Sample
Celery.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
scripts/scripts.dll
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
Celery.exe
-
Size
800.0MB
-
MD5
b4c744abf264ef21108c72d281704b41
-
SHA1
f865c64edce99bade55b7d097d8dda842655cc55
-
SHA256
321f32aca8d188e7164272993d747933c61e15e852f90035c99c09dec2d4f2b5
-
SHA512
1e9386367aea49f5a86ed34793179e52c45f250ad7776bd212eeea2c91d09e7b0e18ca69353092d3c206bd94a97cd01a9247df8260b5368becede52c4c5d0961
-
SSDEEP
49152:uWBRH4OPyauD8t5WJEmdwAl/zSC++SKQ:uWBRHrPyauD8tRKzSCMJ
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
-
-
Target
scripts/scripts.dll
-
Size
18.7MB
-
MD5
88fd7dbf04bcf75123d02009aea3f7f7
-
SHA1
cecf16bdad71e54afc941179ea2b7438a04efa1d
-
SHA256
01481b9a862936fbc090bda4033f22d7ffa5a7bfe5dc32f47c7794332b34eec4
-
SHA512
2c6298b5adf91b51f0042d48e0846f5b196d52a588fd4fc577bf19ec26ad8e547382279a15f8bf131b08b0d7c140534aff25f82d5e8998818b812e72c9493917
-
SSDEEP
393216:hqA/D2IIyzg8DolBo6i0KoI6Di42sC1/syU3DXNs6hq8:hqcaZyV0fC1JOpjhq8
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1