General
-
Target
Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc
-
Size
16KB
-
Sample
240624-tctaqatekl
-
MD5
9edc82805ecc2d30f07d99973883c3c6
-
SHA1
877fae637a454593a1b66bfede20356803833266
-
SHA256
927e8668d7e5b22d0d278cb66ecbb15a51420f2fc5299aaa324d43a7d04719a2
-
SHA512
b24ed91e3f53fe2cfc0b0fdaebcd495cbc878507187a802ed019736be707d5d832f149360dba0cfd394df5e0406bd979fda5aff4357fe4e2bede514098fc8cf3
-
SSDEEP
384:tyXxo8qWds8PL8wi4OEwH8TIbE91r2fR3JYovij7XCnp:tcxIq5P3DOqnYJZ1vO7XCp
Static task
static1
Behavioral task
behavioral1
Sample
Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx
Resource
win10v2004-20240611-en
Malware Config
Extracted
redline
wordfile
185.38.142.10:7474
Targets
-
-
Target
Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc
-
Size
16KB
-
MD5
9edc82805ecc2d30f07d99973883c3c6
-
SHA1
877fae637a454593a1b66bfede20356803833266
-
SHA256
927e8668d7e5b22d0d278cb66ecbb15a51420f2fc5299aaa324d43a7d04719a2
-
SHA512
b24ed91e3f53fe2cfc0b0fdaebcd495cbc878507187a802ed019736be707d5d832f149360dba0cfd394df5e0406bd979fda5aff4357fe4e2bede514098fc8cf3
-
SSDEEP
384:tyXxo8qWds8PL8wi4OEwH8TIbE91r2fR3JYovij7XCnp:tcxIq5P3DOqnYJZ1vO7XCp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-