General
-
Target
CryptoFactory.exe
-
Size
6.0MB
-
Sample
240810-vdsk9ayckk
-
MD5
606d9403c952670ed0566c1d1bce5dc8
-
SHA1
179b8c773a470d6e273808e8b25482810e90efcd
-
SHA256
dffa9b80560b0d59cfce787ef033857edc141646a1496b0cf50a00b1a5b03078
-
SHA512
ecbe8bf0eda38d1cb1cdecf03be58edb1f34b7cb3a17d60d98cabbc7b55429a1b3a69fbca380388f8e8f9de82620047c423464df8190dcc2211f795170c36299
-
SSDEEP
98304:H1GZtGOYln80EisK9yJND14r0Uhmkl1qa1Egu2Wh/X9Tm0OXcPwQESF/IKc6:+FqnPEZZzeJmkl1qHd2i/9TjElH8QKc
Static task
static1
Behavioral task
behavioral1
Sample
CryptoFactory.exe
Resource
win11-20240802-en
Malware Config
Extracted
asyncrat
0.5.8
Default
176.111.174.140:6606
176.111.174.140:7707
176.111.174.140:8808
QaF6X2cpj8fc
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
redline
diamotrix
176.111.174.140:1912
Extracted
C:\HdbtqCuyh.README.txt
Targets
-
-
Target
CryptoFactory.exe
-
Size
6.0MB
-
MD5
606d9403c952670ed0566c1d1bce5dc8
-
SHA1
179b8c773a470d6e273808e8b25482810e90efcd
-
SHA256
dffa9b80560b0d59cfce787ef033857edc141646a1496b0cf50a00b1a5b03078
-
SHA512
ecbe8bf0eda38d1cb1cdecf03be58edb1f34b7cb3a17d60d98cabbc7b55429a1b3a69fbca380388f8e8f9de82620047c423464df8190dcc2211f795170c36299
-
SSDEEP
98304:H1GZtGOYln80EisK9yJND14r0Uhmkl1qa1Egu2Wh/X9Tm0OXcPwQESF/IKc6:+FqnPEZZzeJmkl1qHd2i/9TjElH8QKc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Async RAT payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1