General
-
Target
3e33cba3607467b99b975f6b69b90dfa3d63fc670e844.exe
-
Size
320KB
-
Sample
221101-m4jf9scahm
-
MD5
d4fae7a6d40bfaced3456d116c06636b
-
SHA1
08be33fe4ef5d9600b401b8d188da09236fe6ad8
-
SHA256
3e33cba3607467b99b975f6b69b90dfa3d63fc670e8449f37dd7c3356ec39fd3
-
SHA512
38788407eb16e8583099a0ba82c90e9c02fff037aba46b5fd381db87c7ed74a3625b27fd5e57fafa93c4ad08a7499706656630d45e47c7724762d79ce04ed471
-
SSDEEP
3072:XE1wAS2i/i5li6Y+VcuOuNMxCnFSe2KdVDAiFJRgO0VggjcGkNIVqIV7:uwAS2iapYacuO+QaJrDR3RXw7ITsq
Static task
static1
Behavioral task
behavioral1
Sample
3e33cba3607467b99b975f6b69b90dfa3d63fc670e844.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e33cba3607467b99b975f6b69b90dfa3d63fc670e844.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Targets
-
-
Target
3e33cba3607467b99b975f6b69b90dfa3d63fc670e844.exe
-
Size
320KB
-
MD5
d4fae7a6d40bfaced3456d116c06636b
-
SHA1
08be33fe4ef5d9600b401b8d188da09236fe6ad8
-
SHA256
3e33cba3607467b99b975f6b69b90dfa3d63fc670e8449f37dd7c3356ec39fd3
-
SHA512
38788407eb16e8583099a0ba82c90e9c02fff037aba46b5fd381db87c7ed74a3625b27fd5e57fafa93c4ad08a7499706656630d45e47c7724762d79ce04ed471
-
SSDEEP
3072:XE1wAS2i/i5li6Y+VcuOuNMxCnFSe2KdVDAiFJRgO0VggjcGkNIVqIV7:uwAS2iapYacuO+QaJrDR3RXw7ITsq
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-