General
-
Target
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.zip
-
Size
4KB
-
Sample
241118-rbsxfsxpb1
-
MD5
acdd529caa0275c64931ac2796e61f0f
-
SHA1
c40c28e55cc9597a8cfcff327eafc4fbc352261a
-
SHA256
2840a81e534aa9badebe491f4e4a860a137f8eeb6f70e51c6262d832c5f576eb
-
SHA512
86942d3666e58564990ea179e89d4f2e6066c227ee6c8ad2c7f73f02d05b093c04f3e8f4e9cf26435fbef7efa8aeee6cbfd56d73ed4a6a09ffe65dfea7da9ad1
-
SSDEEP
96:v+dd3RBTeK462K1bz2jldHF4YwYRIzN7oUekf2p8uxrQkSaHPuIqBJwM7+d:KNRVl2PjlddTR9oY8ySavuIqng
Static task
static1
Behavioral task
behavioral1
Sample
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe
Resource
win11-20241007-it
Malware Config
Extracted
redline
38.180.72.54:42814
Extracted
C:\Users\Admin\AppData\Local\Temp\Files\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Extracted
redline
newbundle2
185.215.113.67:15206
Targets
-
-
Target
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
-
Phorphiex family
-
Phorphiex payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Wannacry family
-
Xmrig family
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1