Overview
overview
10Static
static
100eac1dd90f...0d.exe
windows7-x64
100eac1dd90f...0d.exe
windows10-2004-x64
10119f9287f4...9c.exe
windows7-x64
10119f9287f4...9c.exe
windows10-2004-x64
10202588cc1d...10.exe
windows7-x64
10202588cc1d...10.exe
windows10-2004-x64
1028b51218b1...09.exe
windows7-x64
1028b51218b1...09.exe
windows10-2004-x64
10583c56547b...6a.exe
windows7-x64
3583c56547b...6a.exe
windows10-2004-x64
373782bd2a7...e8.exe
windows7-x64
1073782bd2a7...e8.exe
windows10-2004-x64
10d279fb4121...d7.exe
windows7-x64
10d279fb4121...d7.exe
windows10-2004-x64
10General
-
Target
515d4efa87e4dc9103d0d3f42c2b241177e6a5436be06b7f2cff9211be6ea1a6
-
Size
43.7MB
-
Sample
241106-3ypzvszlgw
-
MD5
67451b3af2f010864ee5538219e5a7de
-
SHA1
009d307b162414fef31d81dbf97ddf0a4355c883
-
SHA256
515d4efa87e4dc9103d0d3f42c2b241177e6a5436be06b7f2cff9211be6ea1a6
-
SHA512
c3a327aae559ee7eae1fc261a5d0482041762367833b5d6401f1146f7cd272637ac1c9e4256af1ddb184ac8d66a28f2407333a007a7490022e306e6e22ea6beb
-
SSDEEP
786432:CbYJ5ZZ4dyaA4UQDo40vt+UR5T8dEc6NixfMlg8mNWKNEjwc/MhNAyS7/OK3HFHN:Cu5YQp4HqfX8x6uIgLNWQi/MhWd/33HD
Behavioral task
behavioral1
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
d279fb4121b6a7e552133823a497b4d2502b1494bc0864e2c8689fe92eef7fd7.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
build4
45.139.236.36:33611
Targets
-
-
Target
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d
-
Size
358KB
-
MD5
350b0557936a6ed2d688f895cbbd50ad
-
SHA1
1f6469a384f9af3489a189a8331d82cda0ec6613
-
SHA256
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d
-
SHA512
6bacfa711c5dba242a4da1307153f0d423151fd6e5281f85f05ad64fc14b065275075992049d3e678591dcb51bd9b12d478bd7d04318d36c79c5b5a76fd11efb
-
SSDEEP
6144:k9AZdOmF2ry5xxRG5YJyZyz8JsK1et+IFWBzMdNDlXK4tDk:9vB7sEeHZ2+3IjUAI
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
-
-
Target
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c
-
Size
2.4MB
-
MD5
d4bfc09f4e75c9eef1ead04768aaabc9
-
SHA1
7b9fe73a44da7b5b7b1c8743b8227e07723c8175
-
SHA256
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c
-
SHA512
345a4248cedf541acb667925893db6d3660102ee9e5df9086d69cd03719e038f3f7fae01f1b7a21235a7b57ad2aa49c0d044db793eb2ac9a509e9f355d2a81a6
-
SSDEEP
24576:WNisxv4HA62oNMBzF0MkcFRGP4/G/iE/K3LI7DE3Q1V+Z02cyxxGj:CisqNAz2sGPYspK393bZ02cyx6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-
-
-
Target
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10
-
Size
4.6MB
-
MD5
c7620b77d05f9dac8105469b7d0c854f
-
SHA1
5368819b5aa8db1ee7f5cc5b4b50ecb6aa6faf55
-
SHA256
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10
-
SHA512
0fb1e57e2fd053bacbba7a0aabc00c162432c33a9332bac2c45036173fccbe5bebc2906568d2facea4fcf0963dcfcb557bff932dbb2dc2ec5b8cd736213101d3
-
SSDEEP
98304:I1qaURDb8PNfMVNnlqKL0T/46KhPLQYVVW4G1jOUc/hItwGn:I1zsf8PNfkl/m4zdLQYPZGNI/hmVn
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
-
-
Target
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209
-
Size
4.6MB
-
MD5
6c8e7b9edb130c9dab130f66f9bad1c3
-
SHA1
332e1d7efdf2dc5ecaf6349db417f143b48d60e3
-
SHA256
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209
-
SHA512
74998f93ff487d554c7734e5e7be148a0811d71164447c2a6816469338cc1b00b201e28b2ae01aa3162f63f8908782626206d84a8d62bb64960d0aa8ef38f6c3
-
SSDEEP
98304:N1Mie3EZD4qxp6QQ7Xs/Vd28BfkFsIjfxVFms:N17ZDxpFQ7XYZfkFsEf8s
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
-
-
Target
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a
-
Size
957KB
-
MD5
d4c108f52d1ab06f96ce081199bcfb31
-
SHA1
3cf70a986e72b14bdd11e51625a4e81e6b8bf789
-
SHA256
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a
-
SHA512
2dd84482f2c38120d4b4e29565b1bdaf27844f5797bc469e20196cba65a822ec9e26b4e07b5a505b310b034f0539f21e24f5b525d2fe116e95e9566a7503fa44
-
SSDEEP
24576:EQSyyuBxEdF4cbi1mKp4JCZQ5vabA8JEFn:1VEdFnU4CZJI
Score3/10 -
-
-
Target
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8
-
Size
753KB
-
MD5
c2cdc14235b70d09dbad55af6202d7eb
-
SHA1
72145ec4baac4c0839c409a028aa473a7403673b
-
SHA256
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8
-
SHA512
b1bd8d30c399ef18b2cc473778ab26b9489dec6cbe1b921b043fdaa3bd99a4e6796be1db5f02490da606cf48096c9b538e47fd6422c93084d1774688095086e7
-
SSDEEP
12288:w3rHcIck2bHbGVItlponOR0dHc3mlasg1wvIVtfBl858QFGBqM8f:w3BwO1nDH2BXrk58QFmEf
Score10/10-
Modifies WinLogon for persistence
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
d279fb4121b6a7e552133823a497b4d2502b1494bc0864e2c8689fe92eef7fd7
-
Size
32.2MB
-
MD5
cb3eb826c1c6e385209f0be254c03dfc
-
SHA1
abbf755333db672605802aa1ebaf3b1f2f0fdb6b
-
SHA256
d279fb4121b6a7e552133823a497b4d2502b1494bc0864e2c8689fe92eef7fd7
-
SHA512
b448c6fbd518cc3e146974b3f823412caa5229a3971c15a7d445b30a6ef8a92eb5e1db43e53ad0fa8c03705fc3ac0eea66b458108b11aff3d082e864a1f580b8
-
SSDEEP
786432:BzH0kJTHa3EEITUJRAikwZbvQBnOtNsf2jd8AwvDkQ7rt3A+6x:BNFarIIGirZDAZf2j+LDl7rtY
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1