General
-
Target
xfer records serum keygen torrent.zip
-
Size
21.8MB
-
Sample
240914-lk9nnsxcqm
-
MD5
809d1ebc7c393720540652218fdd082b
-
SHA1
a94e26ef632469260216ef723ccc55bd8e6e75c2
-
SHA256
0bff32f8d8be7319c67a45c16de6df8d964ef0bf0eb1b9006a9bf89fba2a3235
-
SHA512
4a6d8ce1a026da573b6756b28baeb244f5f780b7100c9f96dc1a3c4475d87a1fe8d68d4284a5128b46429d5eb947d8e5373a658e1b74268b91054fcc9e5da3d0
-
SSDEEP
393216:rQR28553MpFGpdDajN2lfSUAAaTO8nxsdswmTkGa8+GX3z2Kq6U4DL+0JDY8YI/:rH8/o8QolZAA5tmTkGF+Gz2KqhAi8f
Static task
static1
Behavioral task
behavioral1
Sample
xfer records serum keygen torrent.exe
Resource
win10-20240404-it
Behavioral task
behavioral2
Sample
xfer records serum keygen torrent.exe
Resource
win7-20240903-it
Behavioral task
behavioral3
Sample
xfer records serum keygen torrent.exe
Resource
win10v2004-20240802-it
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
193.233.255.84:4284
Extracted
stealc
rave
http://185.215.113.103
-
url_path
/e2b1563c6670f193.php
Extracted
cryptbot
tventyvd20ht.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Extracted
lumma
https://complainnykso.shop/api
https://basedsymsotp.shop/api
https://charistmatwio.shop/api
https://grassemenwji.shop/api
https://stitchmiscpaew.shop/api
https://commisionipwn.shop/api
Targets
-
-
Target
xfer records serum keygen torrent.exe
-
Size
886.1MB
-
MD5
c9926b827cc51ab2817a9503846a24d4
-
SHA1
4d391a5d32407ef6ff671bd4de78b8ca78207632
-
SHA256
2b29e0e504db868253668194d79bb5690c7f3b1f6a2152b27a5ae74b55322765
-
SHA512
8a45ccbdd1dc2ea17cd69029c3fc7eae5119b3886786ec00064f379f68501d12db0d5688819462d4bfd5d2783b7b4299711278994026285efe743ee0b55ad590
-
SSDEEP
393216:crr5w6A2nVU0NL4QMoDZzmw2ob75ffquUauHuMAeqn1DMekrMwi/rgUQdng:crrOpne0XgZrvcuT34pAwZg
-
Detect Vidar Stealer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2