General
-
Target
ce847125e867cd956de33232a7d9a257
-
Size
2.3MB
-
Sample
241108-mr6q2azncs
-
MD5
ce847125e867cd956de33232a7d9a257
-
SHA1
1938b129a966f5f03585a14496ba145e81e6b7e7
-
SHA256
bf836fa08f437e98267a44e0d4aaec5cafb62bc72b5f6c9d8f7a643ce0e5e885
-
SHA512
6576c04886877b90491440de2e788d13e7b7f757c97edf1e5c32adaa83e32e161d7f7c3d3b2ef1b3142ad8b318195146760bb418c1bceda9c38b3cd14164f8d7
-
SSDEEP
49152:sdQtXseKpAtHj+keAMa/1EZxWBkIC57ZJ+i7kZ25a5l+W4SESFso:sGXsV8+RjWyxWB7C57Gi7kZ25a5ljpEa
Static task
static1
Behavioral task
behavioral1
Sample
972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
53.4
1571
http://146.19.247.187:80
http://45.142.213.74:80
http://146.19.170.104:80
-
profile_id
1571
Extracted
redline
nam3
103.89.90.61:18728
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
vidar
53.4
1521
http://62.204.41.126:80
-
profile_id
1521
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
raccoon
f0c8034c83808635df0d9d8726d1bfd6
http://45.95.11.158/
-
user_agent
mozzzzzzzzzzz
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://77.73.132.84
-
user_agent
mozzzzzzzzzzz
Targets
-
-
Target
972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de
-
Size
2.4MB
-
MD5
4d9abf7905ad423200a067568f45a2e6
-
SHA1
a19937f1b03ccd9575478369a5666c04080241dd
-
SHA256
972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de
-
SHA512
10db66702b4c8fd375957cda8b9657bf9a5bd184c9b9b232b6e2ade62d841dd9fcac91cb1d88819ef23b6b680f946a72951a6099d9718e72e1993059b5994ba7
-
SSDEEP
49152:pAI+dQBXsC8nktLjj+ywO/5ZKHUnkYw3FwOc+8+ytLsyBpzp2zASOFVS:pAI+UXs96j+Ly3KHUnneFTcFNBpzcUSB
-
Raccoon Stealer V2 payload
-
Raccoon family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Vidar family
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-