Overview
overview
10Static
static
3bin/NativeTrainer.dll
windows7-x64
3bin/NativeTrainer.dll
windows10-2004-x64
bin/ScriptHookV.dll
windows7-x64
3bin/ScriptHookV.dll
windows10-2004-x64
10bin/dinput8.dll
windows7-x64
7bin/dinput8.dll
windows10-2004-x64
7readme.vbs
windows7-x64
1readme.vbs
windows10-2004-x64
1www.dev-c.com.url
windows7-x64
6www.dev-c.com.url
windows10-2004-x64
3General
-
Target
ScriptHookV_1.0.3351.0 (1).zip
-
Size
1.6MB
-
Sample
241126-yrxnxatmcr
-
MD5
197775071f277d3ad044304008c9e38d
-
SHA1
8c2885bfefcb5848d27190684f58db98b564b5f1
-
SHA256
18e39d11238d9ded6a88b808a02ced9247c30071b7acc4217640575901b16cdb
-
SHA512
2b3babb1e97fab1d01a98d0a213e931a0d1fe4b9a943d02f3c41ee5ca18d146658e1ba30a47c2d0909afdfe4cb7f90d42a7671f44c78eeba20ff1cb9cdb6eca3
-
SSDEEP
49152:lZwiqP06u0+ogPq2ItzKRyUoGcJgKeSRQMxxZmp44O:lZw503Pq22zgyU9KeSmMxxI44O
Static task
static1
Behavioral task
behavioral1
Sample
bin/NativeTrainer.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bin/NativeTrainer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
bin/ScriptHookV.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
bin/ScriptHookV.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
bin/dinput8.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
bin/dinput8.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
readme.vbs
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
readme.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
www.dev-c.com.url
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
www.dev-c.com.url
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bin/NativeTrainer.asi
-
Size
211KB
-
MD5
e107b94ae23ec9a56bfa1faaf7118e85
-
SHA1
191d9a3a09ee0cfc0754226988c0373a5f074068
-
SHA256
f2302573ced45cdaaf190f332deeafd3f32e179d7e9102d939608a9ab774b3cf
-
SHA512
86720525ebfa76628a4540a0344de29cf7135ed89dc0c38665fcc2d9ea83c0a2b9341f7d8945e54083317e2dbbb120c68afeb4a7cbbe182db5711c3638d04e90
-
SSDEEP
3072:UPjp1DjzsOn9DTtDs5hmmFlPV1GuV1YTrsof+/3YFoYr6SXvfVd5u:UbbD/PFTK3mydcuDa40iYr6SXTo
Score8/10-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
-
-
Target
bin/ScriptHookV.dll
-
Size
1.9MB
-
MD5
cd43a2b1ba6045ce5a00b0ad200b422f
-
SHA1
c2eab741fbf7b136460f88df03ef5028de415ddc
-
SHA256
b67a5ad375150b6d0202694357cf8622accdb4c676be755cb4b0668dd2783f82
-
SHA512
5922dba362ea39d863d105e427e430844868a0a25b792339bc0aee6b3ceebb0dae30e9bc36ba9575aef0e639dc4dd22634472ee8ea9e48725505a3a8eda9961f
-
SSDEEP
49152:nYI14UpsHf6q+LdoVnZUM4KfeMuIArxxuuuuuuuuuuuuuvMF:Y5U2Hivden8dAArx1
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
bin/dinput8.dll
-
Size
128KB
-
MD5
c9b973183908a6631b31ca29f863b4d1
-
SHA1
6b32c09f1404be8f9eb21e6c1b8955f4bf00e51d
-
SHA256
9fd9e02353b7d39fe07b9667f7ea2697229a7f2d0e7d389eb79eb212b1bb181d
-
SHA512
aa63cfba16d5c134b7478fc27b32e4b1e588f5910205e050d94b59a15f95d886ecaa4c2d494c7c3496b2bb8f386e7a540ec999190714b6e048c6bc07d1a43755
-
SSDEEP
3072:OBK5kXMCQ9hTn7TYgESRbApwUEfo9c+SJwVvjPIB:8K5kXMl5TYgXR02UWPrJAjPI
Score7/10-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
readme.txt
-
Size
7KB
-
MD5
318f1ef802b38cf1941d9c288daf1ebf
-
SHA1
6a3f437472f3885014fc8ec295b0002bc2d271a7
-
SHA256
44c098c17d2188b965961f9278757632e908b77a112170a4fb8136650db04f61
-
SHA512
9a7523ce9a8647f1762f66982d7c5458a117385854830b84cd15ed9e7810650f38e93a77e690f0916e76d4fbf72b398e2775d070e17c85c556ab214144402fd3
-
SSDEEP
96:hIKpPMQH9jO1u3Ny9DzQ9Yt/RmAAChL3kUp1Z1D1lNR43ZNKnK4:hIXQH9K1INy9DuYtJBr3bLRLRcfad
Score1/10 -
-
-
Target
www.dev-c.com.url
-
Size
42B
-
MD5
6d1062a38a2c835b32bb73df4af90fc0
-
SHA1
6283703aed023c2a67ca5caa524f352885d0f3f9
-
SHA256
8250e69c27be10f67c387b69208c4df4aa7823c487a58abffb18a47c02e5ac58
-
SHA512
ae3f4280cc87311f367a9ecfb355024d242de0ed1f4dd0733580d9b3e8d802888b2fa2e7ad867ba9ab398eaeab4bdb8e3bfcb245130470d5f80981c5e796460a
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1