General
-
Target
xxSMTPxx.rar
-
Size
4.4MB
-
Sample
241204-n782rszmhq
-
MD5
8bbf7b847e7d9186ddff364f38d96dd2
-
SHA1
65dbe43eb900f655b36cbb8922bd0263effccbd0
-
SHA256
966f1a3f09434d129c3601f3e1f76c8a941e70a6e07186841fd4142b0d13de5a
-
SHA512
11ad338fdb66f88c8512fe2fd6092b8acd8fbdb90634e4d56034198140ced1b63c8bea2fd494baee837e33def7eb244e06109170b7523b594b9fb826279978f2
-
SSDEEP
98304:7C62cIMiyiHXkF6k6OtvK0O4gQJgs/wo6w:7rzIMid3kFp6b0ZgQy0woB
Static task
static1
Behavioral task
behavioral1
Sample
xxSMTPxx.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
xxSMTPxx.rar
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
xxSMTPxx/Private Cracker/xxSMTPxx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
xxSMTPxx/Private Cracker/xxSMTPxx.exe
Resource
win11-20241007-en
Malware Config
Extracted
redline
noname
148.163.89.57:42212
Targets
-
-
Target
xxSMTPxx.rar
-
Size
4.4MB
-
MD5
8bbf7b847e7d9186ddff364f38d96dd2
-
SHA1
65dbe43eb900f655b36cbb8922bd0263effccbd0
-
SHA256
966f1a3f09434d129c3601f3e1f76c8a941e70a6e07186841fd4142b0d13de5a
-
SHA512
11ad338fdb66f88c8512fe2fd6092b8acd8fbdb90634e4d56034198140ced1b63c8bea2fd494baee837e33def7eb244e06109170b7523b594b9fb826279978f2
-
SSDEEP
98304:7C62cIMiyiHXkF6k6OtvK0O4gQJgs/wo6w:7rzIMid3kFp6b0ZgQy0woB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
xxSMTPxx/Private Cracker/xxSMTPxx.EXE
-
Size
4.6MB
-
MD5
9088655d2558fc34338e8b06e98cd403
-
SHA1
cfeb0f3d288ead6c9fd0aaa4e05dd53127696c22
-
SHA256
3e44ce378be97fc687a392f97abfe6ee0f9e4b1c15d88347668d7c384f7024ac
-
SHA512
49a8cccf8a8801c946fba88a0e6a68f19443dc5e5e01f9d0d09e6bc9cf9bc41932c939e975d63167adb6e73b62f2235fe3dd07dafbb6220467427eacede268a0
-
SSDEEP
98304:il9Goe+rmZQHPN6zkioyxx8zhSGw0g61nWYK6wgPI3:ils9+ro+N9DSTmnWYK6wYI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1