General
-
Target
2dd40beb048efe94f7a62ac83f95a5da2815e05a248ef970dff3f20a4eb8f609
-
Size
681KB
-
Sample
241206-sdggwayncl
-
MD5
00e1431f15d4e7d7521adaf56d1cf9eb
-
SHA1
63c4a9d2327a46296e4d54c9baeb20f683ec9d87
-
SHA256
2dd40beb048efe94f7a62ac83f95a5da2815e05a248ef970dff3f20a4eb8f609
-
SHA512
c0e78ad73ffa3f4c0ab94ce0e21dd3cb0638cdbccbe5b3bcd0d841193a11fbd3485c176b010c3196b21d940dfa5b18f09f53e3dfdd28c5ba881df1637584118d
-
SSDEEP
12288:Cp1zzClVwk1lf0PmOPRQBsoNiDgOIu9diWKg0p2/DqJg7:Cpx8VwkiWaUOIuXZ
Static task
static1
Behavioral task
behavioral1
Sample
2dd40beb048efe94f7a62ac83f95a5da2815e05a248ef970dff3f20a4eb8f609.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2dd40beb048efe94f7a62ac83f95a5da2815e05a248ef970dff3f20a4eb8f609.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
JAPANPORN
45.134.225.35:7821
-
auth_value
18d8418fe71c08942d2ddd0435edb9e5
Extracted
asyncrat
0.5.7B
3333----Japanese----3333
Aakn1515knAakn1515kn!
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/uqaaCRiU
Targets
-
-
Target
2dd40beb048efe94f7a62ac83f95a5da2815e05a248ef970dff3f20a4eb8f609
-
Size
681KB
-
MD5
00e1431f15d4e7d7521adaf56d1cf9eb
-
SHA1
63c4a9d2327a46296e4d54c9baeb20f683ec9d87
-
SHA256
2dd40beb048efe94f7a62ac83f95a5da2815e05a248ef970dff3f20a4eb8f609
-
SHA512
c0e78ad73ffa3f4c0ab94ce0e21dd3cb0638cdbccbe5b3bcd0d841193a11fbd3485c176b010c3196b21d940dfa5b18f09f53e3dfdd28c5ba881df1637584118d
-
SSDEEP
12288:Cp1zzClVwk1lf0PmOPRQBsoNiDgOIu9diWKg0p2/DqJg7:Cpx8VwkiWaUOIuXZ
-
Asyncrat family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-