Overview
overview
10Static
static
33B6F8FE872...A9.exe
windows11-21h2-x64
103B6F8FE872...A9.exe
windows10-2004-x64
103B6F8FE872...A9.exe
windows10-ltsc_2021-x64
103B6F8FE872...A9.exe
windows11-21h2-x64
103B6F8FE872...A9.exe
android-10-x64
3B6F8FE872...A9.exe
android-13-x64
3B6F8FE872...A9.exe
macos-10.15-amd64
3B6F8FE872...A9.exe
ubuntu-18.04-amd64
3B6F8FE872...A9.exe
debian-9-armhf
3B6F8FE872...A9.exe
debian-9-mips
3B6F8FE872...A9.exe
debian-9-mipsel
General
-
Target
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
-
Size
3.6MB
-
Sample
250331-vak21atwcy
-
MD5
cf56adaf1236aa52a98723c8aa61ff84
-
SHA1
00a517dfa5a9294f5619a7a1d8d0181966692768
-
SHA256
3b6f8fe87241a3af1ff1414c5223a20b97f2bb2b7b7a9cb574077e253fb6db88
-
SHA512
2ef67cad31b4792fe066c2cd2f8a745493cf6bd1cab055e689ffa02bb8ec656746f28d06ae0dd6a4a88043c35ac7cf5cc18c3165e81959ef6b6d87ca12a9742b
-
SSDEEP
98304:k5a7Zy+b1yCgWYdhz/tH3ILijJxeWB/5izLurIBQPZJCj:kKA+QWQhLF3ILqJx0zLuL2
Static task
static1
Behavioral task
behavioral1
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral7
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
macos-20241101-en
Behavioral task
behavioral8
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral9
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral10
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral11
Sample
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
Resource
debian9-mipsel-20240226-en
Malware Config
Extracted
redline
cheat
85.215.222.129:43240
Extracted
quasar
2.8.0.1
Images.exe
85.215.222.129:65535
G8fgKgmsR7tqiTolCN
-
encryption_key
SLsfHXfM5GTIubFvF50I
-
install_name
Images.exe
-
log_directory
FiveM_Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Targets
-
-
Target
3B6F8FE87241A3AF1FF1414C5223A20B97F2BB2B7B7A9.exe
-
Size
3.6MB
-
MD5
cf56adaf1236aa52a98723c8aa61ff84
-
SHA1
00a517dfa5a9294f5619a7a1d8d0181966692768
-
SHA256
3b6f8fe87241a3af1ff1414c5223a20b97f2bb2b7b7a9cb574077e253fb6db88
-
SHA512
2ef67cad31b4792fe066c2cd2f8a745493cf6bd1cab055e689ffa02bb8ec656746f28d06ae0dd6a4a88043c35ac7cf5cc18c3165e81959ef6b6d87ca12a9742b
-
SSDEEP
98304:k5a7Zy+b1yCgWYdhz/tH3ILijJxeWB/5izLurIBQPZJCj:kKA+QWQhLF3ILqJx0zLuL2
-
Quasar family
-
Quasar payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
3Virtualization/Sandbox Evasion
1