General
-
Target
record.ico
-
Size
4KB
-
Sample
241220-1z443awjgq
-
MD5
1111e06679f96ff28c1e229b06ce7b41
-
SHA1
9fe5a6c6014b561060a640d0db02a303a35b8832
-
SHA256
59d5e9106e907fa61a560294a51c14abcde024fdd690e41a7f4d6c88db7287a6
-
SHA512
077aff77bbf827b9920cf53dff38427475e590c07ab8901fc34ce7b7fb9e9409207e53aff06fa7d1e3984bcf127507d0fc19284d8e7203c76d67c9b98c1c8f37
-
SSDEEP
48:+8Zjqe+hlcUmCmXGyGC0Uh/2Zr4gvtfyocfR1/mrlR:54Fchp0CuZv44L
Static task
static1
Behavioral task
behavioral1
Sample
record.ico
Resource
win11-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.casalsmd.com - Port:
587 - Username:
[email protected] - Password:
Carolina123
Extracted
redline
194.58.69.100:37026
-
auth_value
5f49406bb3e5cfca230ff81efee4edf8
Extracted
cryptbot
befilu45.top
morkoe04.top
-
payload_url
http://mindoi05.top/download.php?file=lv.exe
Extracted
qakbot
325.43
abc014
1601980173
190.30.185.80:443
75.136.40.155:443
151.73.118.54:443
24.138.77.61:443
84.247.36.26:443
80.240.26.178:443
69.11.247.242:443
71.163.222.203:443
65.131.72.17:995
109.93.11.111:995
80.14.209.42:2222
173.245.152.231:443
173.70.165.101:995
185.246.9.69:995
2.7.65.32:2222
77.30.32.191:995
72.28.255.159:995
69.40.16.109:443
108.46.145.30:443
207.255.161.8:993
89.42.142.35:443
199.247.22.145:443
24.43.22.220:993
45.32.155.12:443
71.187.170.235:443
74.75.237.11:443
71.126.139.251:443
2.50.159.48:2222
172.78.30.215:443
190.85.91.154:443
86.97.184.46:2222
156.213.145.107:443
190.220.8.10:443
74.73.27.35:443
24.53.49.240:2222
184.97.132.62:443
155.186.9.160:443
86.126.17.13:443
195.138.42.49:50001
207.246.75.201:443
96.227.127.13:443
45.77.193.83:443
199.116.241.147:443
95.77.144.238:443
96.30.198.161:443
208.99.100.129:443
72.204.242.138:32102
89.137.211.239:443
72.204.242.138:443
47.44.217.98:443
24.71.28.247:443
108.5.34.248:443
68.190.152.98:443
2.89.114.20:443
197.133.117.15:443
70.168.130.172:995
103.76.160.110:443
103.238.231.40:443
73.228.1.246:443
207.255.161.8:995
24.122.0.90:443
78.97.3.6:443
184.180.157.203:2222
72.204.242.138:53
72.204.242.138:990
98.26.50.62:995
93.113.177.152:443
86.163.174.33:2222
74.109.219.145:443
45.32.154.10:443
66.215.32.224:443
39.36.218.78:995
117.218.208.239:443
134.228.24.29:443
72.204.242.138:32100
217.162.149.212:443
71.19.217.23:443
72.190.101.70:443
207.255.18.67:443
72.204.242.138:50001
78.96.199.79:443
72.186.1.237:443
67.60.113.253:2222
95.179.247.224:443
199.247.16.80:443
80.195.103.146:2222
66.26.160.37:443
24.234.86.201:995
207.255.161.8:443
100.4.173.223:443
103.206.112.234:443
86.177.171.45:2222
216.201.162.158:443
144.139.47.206:443
31.215.193.110:443
77.27.174.49:995
93.149.253.201:2222
2.50.57.36:443
141.158.47.123:443
203.106.195.67:443
2.51.221.138:995
175.211.225.118:443
66.222.88.126:995
61.2.171.191:443
50.244.112.106:443
24.27.82.216:2222
70.174.20.7:443
184.98.103.204:995
72.204.242.138:20
96.18.240.158:443
35.134.202.234:443
74.105.52.200:443
81.133.234.36:2222
207.237.1.152:443
59.26.204.144:443
71.217.125.53:2222
95.77.223.148:443
86.126.230.176:443
2.50.131.64:443
90.175.88.99:2222
68.225.60.77:443
77.31.120.194:995
67.170.137.8:443
24.139.132.70:443
173.22.125.129:2222
71.80.66.107:443
213.31.203.109:2222
59.96.167.209:443
197.210.96.222:995
5.193.181.221:2078
31.5.168.31:443
86.126.108.242:2222
24.205.42.241:443
174.110.39.220:443
5.12.218.57:2222
5.12.255.109:443
203.198.96.200:443
61.230.5.67:443
65.102.136.20:995
94.52.160.116:443
47.138.201.136:443
73.225.67.0:443
24.255.176.233:443
31.5.21.66:443
95.76.109.181:443
69.123.179.70:443
24.28.183.107:995
108.30.125.94:443
68.46.142.48:995
Targets
-
-
Target
record.ico
-
Size
4KB
-
MD5
1111e06679f96ff28c1e229b06ce7b41
-
SHA1
9fe5a6c6014b561060a640d0db02a303a35b8832
-
SHA256
59d5e9106e907fa61a560294a51c14abcde024fdd690e41a7f4d6c88db7287a6
-
SHA512
077aff77bbf827b9920cf53dff38427475e590c07ab8901fc34ce7b7fb9e9409207e53aff06fa7d1e3984bcf127507d0fc19284d8e7203c76d67c9b98c1c8f37
-
SSDEEP
48:+8Zjqe+hlcUmCmXGyGC0Uh/2Zr4gvtfyocfR1/mrlR:54Fchp0CuZv44L
-
Cryptbot family
-
Hawkeye family
-
Qakbot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
6Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1