General
-
Target
25662735c61aad88fad33ef29edffbf9ed738556135774da119bb9eadb321fdd
-
Size
169KB
-
Sample
220923-m1fafaaabk
-
MD5
747220026ace8bb810f557d9a7d3a9f9
-
SHA1
9e7e544b460455a9d85959b24a687ac7e8541b19
-
SHA256
25662735c61aad88fad33ef29edffbf9ed738556135774da119bb9eadb321fdd
-
SHA512
60640e98d660ed5e9499ef5b889ab2cf38465c8bc1938201a7a7400c72b116de962a4ea3632af8335ab8c5dc4d45143056d26d99400dad50ce296f79bcfd01bc
-
SSDEEP
3072:sWDL5R45mHq8OjJ1SmZ/gDivi6F0VZBnel6/PkW4n:FLrjH8/BF0tel
Static task
static1
Behavioral task
behavioral1
Sample
25662735c61aad88fad33ef29edffbf9ed738556135774da119bb9eadb321fdd.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
LogsDiller Cloud (Sup: @mr_golds)
77.73.134.27:8163
-
auth_value
56c6f7b9024c076f0a96931453da7e56
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
25662735c61aad88fad33ef29edffbf9ed738556135774da119bb9eadb321fdd
-
Size
169KB
-
MD5
747220026ace8bb810f557d9a7d3a9f9
-
SHA1
9e7e544b460455a9d85959b24a687ac7e8541b19
-
SHA256
25662735c61aad88fad33ef29edffbf9ed738556135774da119bb9eadb321fdd
-
SHA512
60640e98d660ed5e9499ef5b889ab2cf38465c8bc1938201a7a7400c72b116de962a4ea3632af8335ab8c5dc4d45143056d26d99400dad50ce296f79bcfd01bc
-
SSDEEP
3072:sWDL5R45mHq8OjJ1SmZ/gDivi6F0VZBnel6/PkW4n:FLrjH8/BF0tel
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
XMRig Miner payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-