Resubmissions
09-05-2024 18:25
240509-w2nsmsbc56 1009-05-2024 08:53
240509-ks9szahf2w 1009-05-2024 08:52
240509-ks3pnace25 108-05-2024 09:27
240508-le3m6sdf7t 1007-05-2024 10:53
240507-my8tzach4v 505-05-2024 15:20
240505-sqqlbadg5s 504-05-2024 12:20
240504-phv92sgf24 1004-05-2024 12:17
240504-pf52gage49 1003-05-2024 11:11
240503-naq5pafb29 1030-04-2024 17:26
240430-v1anysbf4y 7General
-
Target
https://github.com
-
Sample
240509-ks9szahf2w
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win11-20240426-en
Malware Config
Extracted
redline
Github_Crypted
20.100.11.101:42074
Targets
-
-
Target
https://github.com
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-