General
-
Target
ad2a8edb56d190c0a1f70b3475fd5c850ba7f22bc756fb374fa3572cb0942e3f
-
Size
14.9MB
-
Sample
241109-1a6llavqek
-
MD5
e8a879755cf4880510bcc2afefdc6af1
-
SHA1
1669bc27bd4a0f8ffae46b1097849086c269f3e9
-
SHA256
ad2a8edb56d190c0a1f70b3475fd5c850ba7f22bc756fb374fa3572cb0942e3f
-
SHA512
7730286cf0bb6f7405a9ff98c98fb0a3d54cd08057c30961237b7b4849509b972f2596dbc6206863190e3ca471a9592472de7038e6905532e5a79aef4f8d7d1d
-
SSDEEP
393216:hBiicNhRX07NqrYhzsHgvZtH/YFIb+5QxuE9jTN:ji3oqrsBKIzB
Static task
static1
Behavioral task
behavioral1
Sample
9d3b35dd52759c54dfe1d0b2853de31a745836acbbd30834237e24ea9f3a243d.exe
Resource
win7-20241023-en
Malware Config
Extracted
socelars
http://www.ecgbg.com/
Extracted
redline
user01new
49.12.219.50:4846
-
auth_value
fcca1ed5af8553053dc74a4c6a9ce601
Extracted
redline
media22test
91.121.67.60:51630
-
auth_value
e3752255984ff2c517a5d164b4c33080
Extracted
redline
@wadiller0
185.154.15.4:21735
Targets
-
-
Target
9d3b35dd52759c54dfe1d0b2853de31a745836acbbd30834237e24ea9f3a243d
-
Size
14.9MB
-
MD5
dbae02b301fffdd6665b76125e089518
-
SHA1
2aef5e1874ad5a4f1de05540d60b3851570d7101
-
SHA256
9d3b35dd52759c54dfe1d0b2853de31a745836acbbd30834237e24ea9f3a243d
-
SHA512
c12ad6d1181462b5fee6d87897cf314b83e047404f5ff2ac25870aeb90698f7c1d18df41ea4e2ac4fccd0b0f4bc33020e080a9e02c017c0e02aeaf3d468da567
-
SSDEEP
393216:xDdgu4GHhgq4TUH4a79HTd9uSLFfb9T4U/VdtjO8z:xdgJq4TgR79HZ9vZ9TPx
-
Detect Fabookie payload
-
Fabookie family
-
Glupteba family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Modifies boot configuration data using bcdedit
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1