General
-
Target
0f674147118b728504faa4e9ee9be1f2.exe
-
Size
995KB
-
Sample
240803-erx5wssgrq
-
MD5
0f674147118b728504faa4e9ee9be1f2
-
SHA1
d1decfde4071500708161329f9e0c29e85fea315
-
SHA256
f7a08ebdae40fcb8cdc61a569fdf42b9e65d2dd8f88a4cca9cae0e632a3d8f53
-
SHA512
584f4b6caf6e12c692fb8a450c98931910a50f89f424adb10f349db3b7b8f8b485dbe8c7f0731f5d8a2e330973385b6d9692822abc398817db8a2c21aef33250
-
SSDEEP
24576:Cf+6UNxk0J9qt3BGVF+gyToYisepcgq9VB0dEV:CG6U80JAt3BGVF2ksepcnjB0d2
Static task
static1
Behavioral task
behavioral1
Sample
0f674147118b728504faa4e9ee9be1f2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0f674147118b728504faa4e9ee9be1f2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
henzz.ddns.net:7000
vtEVqifwQsIiyHfJ
-
install_file
USB.exe
Extracted
redline
Henz
54.37.93.250:45867
Targets
-
-
Target
0f674147118b728504faa4e9ee9be1f2.exe
-
Size
995KB
-
MD5
0f674147118b728504faa4e9ee9be1f2
-
SHA1
d1decfde4071500708161329f9e0c29e85fea315
-
SHA256
f7a08ebdae40fcb8cdc61a569fdf42b9e65d2dd8f88a4cca9cae0e632a3d8f53
-
SHA512
584f4b6caf6e12c692fb8a450c98931910a50f89f424adb10f349db3b7b8f8b485dbe8c7f0731f5d8a2e330973385b6d9692822abc398817db8a2c21aef33250
-
SSDEEP
24576:Cf+6UNxk0J9qt3BGVF+gyToYisepcgq9VB0dEV:CG6U80JAt3BGVF2ksepcnjB0d2
-
Detect Xworm Payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2