General
-
Target
69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819
-
Size
319KB
-
Sample
221101-tzmrfsecfk
-
MD5
10ede4cd981030348cd6ba5fe1903a6b
-
SHA1
6068ff7ec1ae97c1b1b19b8c81fdd191102d365c
-
SHA256
69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819
-
SHA512
e34eaa5dba3077f45b54264a2e2f6196ba0d425c39db6db0fc3f994a326499933c16558caf6d8f02d9654eb411988b1884e1def95a40f35c8fcbc522201771ef
-
SSDEEP
6144:UVZG84i8N5wZ55DQ7xGC5Q/vXe27ITsqe:UVZG+05o55MxK//7
Static task
static1
Behavioral task
behavioral1
Sample
69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Targets
-
-
Target
69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819
-
Size
319KB
-
MD5
10ede4cd981030348cd6ba5fe1903a6b
-
SHA1
6068ff7ec1ae97c1b1b19b8c81fdd191102d365c
-
SHA256
69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819
-
SHA512
e34eaa5dba3077f45b54264a2e2f6196ba0d425c39db6db0fc3f994a326499933c16558caf6d8f02d9654eb411988b1884e1def95a40f35c8fcbc522201771ef
-
SSDEEP
6144:UVZG84i8N5wZ55DQ7xGC5Q/vXe27ITsqe:UVZG+05o55MxK//7
-
Detect Amadey credential stealer module
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-