General
-
Target
a3b251a139324a6df006eb9733c30199edf41dffe994ca0140296605613c2132
-
Size
6.9MB
-
Sample
241109-y7c97s1jds
-
MD5
28823e5cf76c61084a0fc0f7602b3ef8
-
SHA1
aaab9a7d36b2305565ad8c02046f4b8e6fb25a56
-
SHA256
a3b251a139324a6df006eb9733c30199edf41dffe994ca0140296605613c2132
-
SHA512
fd85cb7c7a22cad58d8c236cf6a0e8bbf1a80f79641089f42ea1226fa3bbe5cbe79b68dc40cba772b9f8888cef045a590876777b96db3971074f153f03738aa0
-
SSDEEP
196608:RQlFsvl2/JuhKjNab8tXxWOBcpfTUcC0n+b2ACY8qd7:sFe2/ghKRg8FjBOfTXC3bd8qV
Static task
static1
Malware Config
Extracted
ffdroider
http://101.36.107.74
Extracted
redline
JamesHook
185.241.54.156:35200
Targets
-
-
Target
66dc47363eed7c1f7528e1859a32037020450756eb0ce8950df397a64058481c
-
Size
7.0MB
-
MD5
a763081fbd0df59db9afcfdcd544c70c
-
SHA1
76df12d98b8dadab8358394efd7a656cc07e48a1
-
SHA256
66dc47363eed7c1f7528e1859a32037020450756eb0ce8950df397a64058481c
-
SHA512
ed1982e8911445db959ff07f5c4d9b43ed997a2a7690fed88dc6bff23fe1fc2abf7bfea8f4ab94a70e9491681b74da1a458e63bd6cdb15ec7647b2612ce0d694
-
SSDEEP
196608:4jLiXXL2mBhLXpB8xxYiUbSmk/qIhAsAl5rq:478LfiUbS7Z2rq
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1