Resubmissions
09/05/2024, 18:25
240509-w2nsmsbc56 1009/05/2024, 08:53
240509-ks9szahf2w 1009/05/2024, 08:52
240509-ks3pnace25 108/05/2024, 09:27
240508-le3m6sdf7t 1007/05/2024, 10:53
240507-my8tzach4v 505/05/2024, 15:20
240505-sqqlbadg5s 504/05/2024, 12:20
240504-phv92sgf24 1004/05/2024, 12:17
240504-pf52gage49 1003/05/2024, 11:11
240503-naq5pafb29 1030/04/2024, 17:26
240430-v1anysbf4y 7General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
lumma
C2
https://acceptabledcooeprs.shop/api
https://obsceneclassyjuwks.shop/api
https://zippyfinickysofwps.shop/api
https://miniaturefinerninewjs.shop/api
https://plaintediousidowsko.shop/api
https://sweetsquarediaslw.shop/api
https://holicisticscrarws.shop/api
https://boredimperissvieos.shop/api
Targets
-
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-