General
-
Target
07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8.exe
-
Size
1.8MB
-
Sample
240725-sg82asyela
-
MD5
d7e66880341b1a0e1bd53696b64e4833
-
SHA1
1609e5620c3a8151adc69ba3b058538597d77aa6
-
SHA256
07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8
-
SHA512
67b34ef9fa7a1ade39b56250dba47853f4a900294dca053ade07f4f59168c520d127ca8809eb2356767444d323424da449493f57946f84ae1d1c9bdb1c20e64f
-
SSDEEP
49152:nTvC/MTQYxsWR7aqXHHJpGPn8z+uPQVpSfyYEpq:TjTQYxsWRRnTGP86pA9Ep
Static task
static1
Behavioral task
behavioral1
Sample
07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8.exe
-
Size
1.8MB
-
MD5
d7e66880341b1a0e1bd53696b64e4833
-
SHA1
1609e5620c3a8151adc69ba3b058538597d77aa6
-
SHA256
07f970cff95e1ebcde588ad8808915376341e9f371f9c05a9873f942988b4ac8
-
SHA512
67b34ef9fa7a1ade39b56250dba47853f4a900294dca053ade07f4f59168c520d127ca8809eb2356767444d323424da449493f57946f84ae1d1c9bdb1c20e64f
-
SSDEEP
49152:nTvC/MTQYxsWR7aqXHHJpGPn8z+uPQVpSfyYEpq:TjTQYxsWRRnTGP86pA9Ep
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1