General
-
Target
f4776df71ae7691cc1aa795c65b8d47bfaf6b7d9dc1bddd08ac7f64d6d2f3532
-
Size
259KB
-
Sample
221028-lm1hsafffq
-
MD5
8db2aa4a8487af88c6484945e6b16035
-
SHA1
f5e55e81021d947d417936c949ecbc20c86a444c
-
SHA256
f4776df71ae7691cc1aa795c65b8d47bfaf6b7d9dc1bddd08ac7f64d6d2f3532
-
SHA512
4fb92cb8b550c7ef31dcdb87bfbad2c4c119ad8dee9e116c4fe2abf77894d4eed38394b4aabd0bc79df6901a3b1ba750075d152f68b99a93d8a7e68b9597cc9f
-
SSDEEP
6144:mpnHBLAWoOQzqDrNvYUhC80sPChgxtuVp:mpnHByBzepvzhC80s6hiEVp
Static task
static1
Behavioral task
behavioral1
Sample
f4776df71ae7691cc1aa795c65b8d47bfaf6b7d9dc1bddd08ac7f64d6d2f3532.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Targets
-
-
Target
f4776df71ae7691cc1aa795c65b8d47bfaf6b7d9dc1bddd08ac7f64d6d2f3532
-
Size
259KB
-
MD5
8db2aa4a8487af88c6484945e6b16035
-
SHA1
f5e55e81021d947d417936c949ecbc20c86a444c
-
SHA256
f4776df71ae7691cc1aa795c65b8d47bfaf6b7d9dc1bddd08ac7f64d6d2f3532
-
SHA512
4fb92cb8b550c7ef31dcdb87bfbad2c4c119ad8dee9e116c4fe2abf77894d4eed38394b4aabd0bc79df6901a3b1ba750075d152f68b99a93d8a7e68b9597cc9f
-
SSDEEP
6144:mpnHBLAWoOQzqDrNvYUhC80sPChgxtuVp:mpnHByBzepvzhC80s6hiEVp
-
Detect Amadey credential stealer module
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-