Overview
overview
10Static
static
31f8769fd48...14.exe
windows7-x64
31f8769fd48...14.exe
windows10-2004-x64
105f6164d2ea...62.exe
windows7-x64
35f6164d2ea...62.exe
windows10-2004-x64
1083b22007de...df.exe
windows7-x64
1083b22007de...df.exe
windows10-2004-x64
109df1f53fbc...04.exe
windows7-x64
109df1f53fbc...04.exe
windows10-2004-x64
10c3ba328200...2b.exe
windows7-x64
10c3ba328200...2b.exe
windows10-2004-x64
10cdf2e2bb7a...0d.exe
windows7-x64
10cdf2e2bb7a...0d.exe
windows10-2004-x64
10General
-
Target
0c67cdf75a11afe7a59cd9b7b7ce17af
-
Size
4.7MB
-
Sample
241109-mg9pyasfrr
-
MD5
0c67cdf75a11afe7a59cd9b7b7ce17af
-
SHA1
c44ea66b027e56fb46c20a89deae3868152ea3c5
-
SHA256
a1dc211e8d06ae69e12064fc0864bde685922fcd92d4ac0caef224dd97d65769
-
SHA512
cf809511495b6f3cf1654371e576682927cb5bad9600aa5387e7fd1db409f03d2a9cfc7dce5da62643bed4ec490ee85f16eea01337eb0199a7d89eeb360c1fd7
-
SSDEEP
98304:xaBdy/IFf8Z7XiTfASzot+4F9HCJqhNKxpcUIycF9gt:xaBJUZ7XiTfjMt+4F16qhNKLIp9gt
Static task
static1
Behavioral task
behavioral1
Sample
1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cdf2e2bb7acf49bf5c44e60adf26fafa901e6fe7f7421dcdd8153d70fb457d0d.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
55.4
977
https://t.me/truemansho
https://mas.to/@jogifoy492
http://95.217.27.155:80
-
profile_id
977
Extracted
vidar
55.3
915
https://t.me/slivetalks
https://c.im/@xinibin420
http://95.216.182.38:80
-
profile_id
915
Extracted
redline
coly
77.91.102.72:29518
-
auth_value
815f926d161a4b44f4ec4837f2b84795
Extracted
vidar
54.7
1597
https://t.me/trampapanam
https://nerdculture.de/@yoxhyp
http://5.161.21.185:80
-
profile_id
1597
Extracted
redline
colybr
188.119.112.156:24790
-
auth_value
f6f76d681091d5a2764934b620eadcac
Extracted
vidar
55.3
977
https://t.me/slivetalks
https://c.im/@xinibin420
http://195.201.252.190:80
-
profile_id
977
Targets
-
-
Target
1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214
-
Size
4.8MB
-
MD5
a5846ee6033e8aaefbdae71a763c88c7
-
SHA1
80b3d6f96c9bd29746139a50840628206537bf4c
-
SHA256
1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214
-
SHA512
ba39a76a5acbeed906f4c4413f544071f2662ca6a0278d6c064a911ea8ffac0f7968cb57668cd1cd7e0989f9521ad4705bd713da0f37649b758cbd3e66ba9627
-
SSDEEP
98304:gjw7hqfK86hPFVi9XYeJL9XO9PW5XzbuH9G8eJBuVu91r5df7P4CC9jj:09XZLT7P4
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of SetThreadContext
-
-
-
Target
5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862
-
Size
1.9MB
-
MD5
4c4e62732210a9e368a695d9c3ad3266
-
SHA1
6d006e88980d42893a52d37d0c04c67b56ad96ae
-
SHA256
5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862
-
SHA512
bd00084f2d424f678a4c687ed04d09dc8bf9ac25d29da66d7f59f204f594caf8532cd6129219084ddbdfe997b695feb20add357ded5e691b9fcbafbc262ef56d
-
SSDEEP
12288:03772bJAEN9Tm6GveOSvWRjdsW6Z01T6AFS:0H8Kq41KvEjV3n
-
Vidar family
-
-
-
Target
83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df
-
Size
1.4MB
-
MD5
19878e2bfef041ccd5a1cea0f7cfe0fb
-
SHA1
a9a4317a394a2cc6aac267ac490bd6ea51fa7d20
-
SHA256
83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df
-
SHA512
0bdeb868cfdb07da3f006a29cbaf8b5e7d4ca182274e06e1bcaca768ced57aa74a71de2c3fd08d521f1de9bc6352537ab3e55631a17ec6e716d55d95e641b5ed
-
SSDEEP
12288:+njobiYt1nWZQzjFeM6DJOjB9sTTHyFCLw1gTFT0GeIJl3DL6irTPFi9:ht1nYQb6VOhC02KI73DI
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
-
-
Target
9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04
-
Size
6.3MB
-
MD5
591df45064fda833d31f9a20fdf813cf
-
SHA1
1e3a37473bb5804bc89647051070601366b275ed
-
SHA256
9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04
-
SHA512
e877ece2e4ffaeb1777e80f9ccb486a6cbc75b4f2977a00e1e02a7171cda82bdb8f22716bb55135fcc27c917da69a18870fc9ef730e7b296aee9f4871053a102
-
SSDEEP
6144:2T4Tv+TLI+NE3B+KHJ6SSfwfZzUBEOOPfNX:2TqkU+NgBDHJcw4aX
-
Vidar family
-
-
-
Target
c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b
-
Size
7.3MB
-
MD5
e10eb4190253081880b3201dbe5fb87d
-
SHA1
cc74ebf650bb3e85ebe3da9b73c4f036f2d35b3e
-
SHA256
c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b
-
SHA512
05123c281ec8d32cecebebe0e0be2c72c343a51d451d13ac55f4b96a14fdd7b52db443c7f5f5f9dcf7457e61e15a52cc0adf841de2170c3ad9b2d84a7555b13d
-
SSDEEP
6144:8lPpeJsRFLq1VDYVrC3mPT/ptUQ8gD2Lc0oDf9sVuq1:8lEq/W19U+0ptlZqLHw1BW
-
Vidar family
-
-
-
Target
cdf2e2bb7acf49bf5c44e60adf26fafa901e6fe7f7421dcdd8153d70fb457d0d
-
Size
1.4MB
-
MD5
18c22ba7ff8c847651ca0114f044cfdb
-
SHA1
82f0cc17c37a2580c14167b92ab252b43276c5da
-
SHA256
cdf2e2bb7acf49bf5c44e60adf26fafa901e6fe7f7421dcdd8153d70fb457d0d
-
SHA512
98ffd6b429686b8f9d28e3b3da31b225e1e7084d2f747756647ff1d94bef88d88cd6e204d74542d32228501aea7f870ad96e59d1c79e388738b9070567809369
-
SSDEEP
24576:USpthafGkllBfyJYFYlnR+8PMoZtcMdc+tXyk+adzbRFKH6KznN4+inP5cw:JvcfGklXfQx+EfYnYRcw
-
Vidar family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-