General
-
Target
05df07e5e365386ae0917e177328bc12a2405a1c4317266127abb6903aac59b3.exe
-
Size
282KB
-
Sample
240717-skg2zszaqe
-
MD5
4ce2c0836c46c61b588972b56a23d5e2
-
SHA1
939a9f983870df1913acce63ca408bba9789588f
-
SHA256
05df07e5e365386ae0917e177328bc12a2405a1c4317266127abb6903aac59b3
-
SHA512
7b32f30b61ca8dcd9ae897d4d9e0480d8e0e2e5ae43f5f56f393d6a0dce7fa79e501c3d3609fcd288624c817401aa7f53c5f2fcdd7dda78d32c5034519d7256e
-
SSDEEP
6144:+sxanyfX5k7JlJDlABKUtfU/WQcb5sDqaxw3fWHdJytaaDlNiJ:f0nyfXuIBDtfu3qaxzHdJytlM
Static task
static1
Behavioral task
behavioral1
Sample
05df07e5e365386ae0917e177328bc12a2405a1c4317266127abb6903aac59b3.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
winsc
pst-child.gl.at.ply.gg:9336
Extracted
xworm
5.0
45.88.186.18:7000
BjImkAWMcrtpfpkF
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6973607627:AAGW_Zx412oiEhjCq5cqO_ZHLESeW8b4re4/sendMessage?chat_id=6678411703
Targets
-
-
Target
05df07e5e365386ae0917e177328bc12a2405a1c4317266127abb6903aac59b3.exe
-
Size
282KB
-
MD5
4ce2c0836c46c61b588972b56a23d5e2
-
SHA1
939a9f983870df1913acce63ca408bba9789588f
-
SHA256
05df07e5e365386ae0917e177328bc12a2405a1c4317266127abb6903aac59b3
-
SHA512
7b32f30b61ca8dcd9ae897d4d9e0480d8e0e2e5ae43f5f56f393d6a0dce7fa79e501c3d3609fcd288624c817401aa7f53c5f2fcdd7dda78d32c5034519d7256e
-
SSDEEP
6144:+sxanyfX5k7JlJDlABKUtfU/WQcb5sDqaxw3fWHdJytaaDlNiJ:f0nyfXuIBDtfu3qaxzHdJytlM
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-