General
-
Target
1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217
-
Size
858KB
-
Sample
250123-ce5cbswqbs
-
MD5
81c903bf6c6adda5f374876e8460a2e6
-
SHA1
591a1855a57c22b53e64f1d508a0632ef2f00828
-
SHA256
1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217
-
SHA512
9e239d192a3bca873a582636ba3df51537f238a75106e836debfd40942a68b78495a2babf74475452950fafc82f717a4696d2d5ddf0e7b92a151bdc8b3727517
-
SSDEEP
12288:7SkUEyq0tJpRGerwMI2HSmPRcvfawb6JPOiH:+kUEy9RGe0F2ypfn6JPO
Static task
static1
Behavioral task
behavioral1
Sample
1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.3.0.0
Botnet 4.2
myowndomain394863467.com:80
2.56.213.169:80
kq7jVCudi9RxxqT976
-
encryption_key
TDyLsJ9jM1rI6kCJGkYI
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
redline
KMSpico
2.56.213.169:6441
-
auth_value
31972fd5af1a03641abaf28a521a2935
Targets
-
-
Target
1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217
-
Size
858KB
-
MD5
81c903bf6c6adda5f374876e8460a2e6
-
SHA1
591a1855a57c22b53e64f1d508a0632ef2f00828
-
SHA256
1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217
-
SHA512
9e239d192a3bca873a582636ba3df51537f238a75106e836debfd40942a68b78495a2babf74475452950fafc82f717a4696d2d5ddf0e7b92a151bdc8b3727517
-
SSDEEP
12288:7SkUEyq0tJpRGerwMI2HSmPRcvfawb6JPOiH:+kUEy9RGe0F2ypfn6JPO
-
Quasar family
-
Quasar payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Creates new service(s)
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1