General
-
Target
1ab9115cce93709220c60217c4077c34.exe
-
Size
657KB
-
Sample
220906-kr6d6aabb2
-
MD5
1ab9115cce93709220c60217c4077c34
-
SHA1
4444d87625d9001bbbe99d975542b97884cb83a0
-
SHA256
5f786ef7b4a40accb4b2903acf2bdf1b249c2c4514303bb7ca3c5ac6010ac9d4
-
SHA512
cd46ae14d3a2c81ea4bd791a51b867293c10ee3771697f6204e816f055d366b4f9a2f9faa5285cf4dd3c5f49066aa6b75805dc61da3a561810a6ef87ac5a12e1
-
SSDEEP
6144:dg5nk5lJmbKTk6b3HVaMjAsbNWTIRlRDBnN9PFja0HdjfCvA+YJJAUPvQ:dg5nkxmGT3Nx0MJN9PFrHdLCY+YJg
Static task
static1
Behavioral task
behavioral1
Sample
1ab9115cce93709220c60217c4077c34.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ab9115cce93709220c60217c4077c34.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Extracted
redline
Lyllkal.05.09
185.215.113.216:21921
-
auth_value
2df530f82cb4bd0f6bef5527a1d5de70
Targets
-
-
Target
1ab9115cce93709220c60217c4077c34.exe
-
Size
657KB
-
MD5
1ab9115cce93709220c60217c4077c34
-
SHA1
4444d87625d9001bbbe99d975542b97884cb83a0
-
SHA256
5f786ef7b4a40accb4b2903acf2bdf1b249c2c4514303bb7ca3c5ac6010ac9d4
-
SHA512
cd46ae14d3a2c81ea4bd791a51b867293c10ee3771697f6204e816f055d366b4f9a2f9faa5285cf4dd3c5f49066aa6b75805dc61da3a561810a6ef87ac5a12e1
-
SSDEEP
6144:dg5nk5lJmbKTk6b3HVaMjAsbNWTIRlRDBnN9PFja0HdjfCvA+YJJAUPvQ:dg5nkxmGT3Nx0MJN9PFrHdLCY+YJg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Detectes Phoenix Miner Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation