General
-
Target
Exodus Backup.zip
-
Size
224.2MB
-
Sample
241128-hbk26svmhl
-
MD5
dbb7b2722726811d996ad2674ccd88dc
-
SHA1
b079fac5f4772d8eb549bf7f03e9c4af17e09245
-
SHA256
21b4e9035539bfd9e1d5887325fd5c671c113830035b347b0f1d002a7fa5ead6
-
SHA512
9ff8f75c98b1cfac4afe407be545d8f0d3eaedf8e9b171a46371f960e40eee6589ead09559e1c2da7cc1036241733b4cf96794da485eb5155af6311c535ccde6
-
SSDEEP
6291456:5pHqxhMpbUQPrvc7k9u6zz5vUFhC6nRn8fPbJShHH5vLsCDX:LHqxIbUQzvc7uu6H5vUFA6YQhHH5vLsi
Static task
static1
Behavioral task
behavioral1
Sample
Exodus Backup.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Export 12-word secret recovery phrase.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
redline
Exodus
85.117.241.171:1912
Targets
-
-
Target
Exodus Backup.zip
-
Size
224.2MB
-
MD5
dbb7b2722726811d996ad2674ccd88dc
-
SHA1
b079fac5f4772d8eb549bf7f03e9c4af17e09245
-
SHA256
21b4e9035539bfd9e1d5887325fd5c671c113830035b347b0f1d002a7fa5ead6
-
SHA512
9ff8f75c98b1cfac4afe407be545d8f0d3eaedf8e9b171a46371f960e40eee6589ead09559e1c2da7cc1036241733b4cf96794da485eb5155af6311c535ccde6
-
SSDEEP
6291456:5pHqxhMpbUQPrvc7k9u6zz5vUFhC6nRn8fPbJShHH5vLsCDX:LHqxIbUQzvc7uu6H5vUFA6YQhHH5vLsi
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-
-
-
Target
Export 12-word secret recovery phrase.exe
-
Size
224.6MB
-
MD5
eb4fb6e1c5ebfb3775f4c69f096607b4
-
SHA1
99551ae3ba358acf9c2c09bab8bd8ed2e207b62d
-
SHA256
149426bcc226da12143a3fed2924c057eb2b6cde0d7c35da828619722d92bebd
-
SHA512
0e26cd355c760148455ee9f5c6b21360135dcd88fcff9e996ce0ffd295e9e2e7397e1c7ec2293bbe327ff142b39c62b0c6c1fc77884f4614dcaaa8acaa5b966f
-
SSDEEP
6291456:K3TALfelJCmbxJALe9CCr/BH69l28PxH8b/3fwbBHjB3sM3:kTALGJCmlJALACCDBH69k8kAbBHjB3sS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-