General
-
Target
7796dc857d29ba8b30a992bd720fcfb46c6440508a5228c60d475739c9a35ee7
-
Size
3.8MB
-
Sample
241111-lscc5swrax
-
MD5
d48997e361393fdd3c51a52fe3c695fb
-
SHA1
cb063756f07ace5564b932bae44d6407bb41b415
-
SHA256
7796dc857d29ba8b30a992bd720fcfb46c6440508a5228c60d475739c9a35ee7
-
SHA512
ee930620d68ace0f968c6f9e14d46baa130bb680ecbb567a8438d934ec67767dc642872ce2e4dde1c53fa2882892bb181eff1f13212cf9d366e88435c3f8c8db
-
SSDEEP
98304:LjLlFY9mjtre0ySwDWXgeRDAl4Fd12b+p:vxFYAjtruxDWXgeRMuY6
Static task
static1
Behavioral task
behavioral1
Sample
f495ac77f61eb2da9ee00f97a39d4221ab43c6ee345848786ead531c24e7b5ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f495ac77f61eb2da9ee00f97a39d4221ab43c6ee345848786ead531c24e7b5ff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
redline
she
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
gcleaner
ggg-cl.biz
45.9.20.13
Extracted
redline
ANI
45.142.215.47:27643
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Targets
-
-
Target
f495ac77f61eb2da9ee00f97a39d4221ab43c6ee345848786ead531c24e7b5ff
-
Size
3.8MB
-
MD5
e2704602499161060992e1463d6f93db
-
SHA1
53701d9b0a46550c58152ed0ffb0d1a06b12baa0
-
SHA256
f495ac77f61eb2da9ee00f97a39d4221ab43c6ee345848786ead531c24e7b5ff
-
SHA512
703d1dd03e89a29de1cfde98bbe3bee52e6b1fedf1f51894d922ddb5e74bfd13f3f7b72d22d581ebe9a3344af5fb3c6f83e8d41478a84d25255ebe8c5ea4ed2d
-
SSDEEP
98304:xuCvLUBsgzEH1qasYnzLNe5bJcIWPrHzLvmIp7y:xnLUCgQvs6NiVb4HzL7y
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1