General
-
Target
1D3961A5C49F14F107E4CEE038D45FD0.exe
-
Size
93KB
-
Sample
241127-nexs2a1ndt
-
MD5
1d3961a5c49f14f107e4cee038d45fd0
-
SHA1
beebd3db77e5a5b91336447791a8a0abcbed9ad6
-
SHA256
edf2ccaca8d236e6cb3ba9e98c9171c52a23545489bcd756cd47b2eb11baeaba
-
SHA512
47037e6a9652148f6e15db0572e4989bde1e811732dc6bd4358ed868696b7ad39fb0fe572f74ab1b1eab96b8b70e9c0e775640c04ad888d3023f20dd0ebd7bd5
-
SSDEEP
1536:aaewCXifh+t5dfmrsT7ezGFeSnBad8pKJHFr7mkgiBgi08FilaebKT10IfLJFDYx:aamyZSdfmrsT7aoM8UHmvied8U4e+6EQ
Static task
static1
Behavioral task
behavioral1
Sample
1D3961A5C49F14F107E4CEE038D45FD0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1D3961A5C49F14F107E4CEE038D45FD0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
kek
212.87.215.19:37552
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
212.87.215.19:1602
xtqapdqeqwwlkdcvcat
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
1D3961A5C49F14F107E4CEE038D45FD0.exe
-
Size
93KB
-
MD5
1d3961a5c49f14f107e4cee038d45fd0
-
SHA1
beebd3db77e5a5b91336447791a8a0abcbed9ad6
-
SHA256
edf2ccaca8d236e6cb3ba9e98c9171c52a23545489bcd756cd47b2eb11baeaba
-
SHA512
47037e6a9652148f6e15db0572e4989bde1e811732dc6bd4358ed868696b7ad39fb0fe572f74ab1b1eab96b8b70e9c0e775640c04ad888d3023f20dd0ebd7bd5
-
SSDEEP
1536:aaewCXifh+t5dfmrsT7ezGFeSnBad8pKJHFr7mkgiBgi08FilaebKT10IfLJFDYx:aamyZSdfmrsT7aoM8UHmvied8U4e+6EQ
-
Asyncrat family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2