General
-
Target
dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21
-
Size
217KB
-
Sample
221017-1hpytadehm
-
MD5
d410a31fec5417accd324ac491abfb69
-
SHA1
af05cebba570896cd9ffb651572ed55b94cfcd75
-
SHA256
dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21
-
SHA512
c044ad178c73b92efd2d0e86363d6ef029c1712af8dacd12180d2ed28d75e9d43a6fcf4e85cd1249e3936f8918c049707756a3df1f9a968288a0e77372f12058
-
SSDEEP
3072:KYA3wHwEJmQZX3S1G4LzaRHBv6UiPCFCHjnGAg+vRazYOE/mGua1n8Y:KL3wT5XipLzaVBv6rGtPEZJ1n8
Static task
static1
Behavioral task
behavioral1
Sample
dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
45.15.156.37:110
-
auth_value
5b663effac3b92fe687f0181631eeff2
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=eblon
DUQm48oydKgNwdYn4PzPZYxY9smehcHVjB
rGzqdqBk9a5BGhC4JWBSmwQiBy8zdnR7Tn
0x379844563B2947bCf8Ee7660d674E91704ba85cc
Xuz8aqGG2mBWXt4gDRMDkSseFKKe6zziyi
TNCZ8Qu1GQqV5Fi6iZBdiHXMxVu1LYFqQX
t1LyGvKhU1Gc14vvoR1fugvb5D3ueGdKkvz
GAHOFB2SVCUHKTB6F5L7GGDHAK7JLJJL73B6NBTB4WFB2GDDJZIDJDCX
46udGK3EgNQKESwPaYA8EQNLkxMhYZChhGxGJDtL112b15yVDPUiitoDZ6J152778r87B8HYaoWZzgdE32Fo4V8ZBDtnYjh
qpmxvq0yc6vzh8p24ytkck4zwyeuwpxmnvy9m48hvv
bc1qr8qp3yvj5t46tx2c0h3rt2g2jzunwafr2h6wwf
0x81B94C343661fbE735d2560c8190241f9958e94d
Lega1BRXbYREKUP64MxdWZXF8XkaT4R79f
ronin:41e9c027a808f6c59579a67e1a9a898c2ad1206a
+79889916188
+79889916188
+79889916188
P1074987499
Lega1BRXbYREKUP64MxdWZXF8XkaT4R79f
ltc1qpu9glf7q3d05dknexcl7alw6y8k3rcelmteu24
bc1qr8qp3yvj5t46tx2c0h3rt2g2jzunwafr2h6wwf
bc1qr8qp3yvj5t46tx2c0h3rt2g2jzunwafr2h6wwf
t1LyGvKhU1Gc14vvoR1fugvb5D3ueGdKkvz
ltc1qpu9glf7q3d05dknexcl7alw6y8k3rcelmteu24
Targets
-
-
Target
dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21
-
Size
217KB
-
MD5
d410a31fec5417accd324ac491abfb69
-
SHA1
af05cebba570896cd9ffb651572ed55b94cfcd75
-
SHA256
dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21
-
SHA512
c044ad178c73b92efd2d0e86363d6ef029c1712af8dacd12180d2ed28d75e9d43a6fcf4e85cd1249e3936f8918c049707756a3df1f9a968288a0e77372f12058
-
SSDEEP
3072:KYA3wHwEJmQZX3S1G4LzaRHBv6UiPCFCHjnGAg+vRazYOE/mGua1n8Y:KL3wT5XipLzaVBv6rGtPEZJ1n8
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-