General
-
Target
9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1
-
Size
340KB
-
Sample
221102-a3721sgbg9
-
MD5
258b594d256e8698142efe18067b9dc8
-
SHA1
7b0cf847003712b9b95131063d6c7102c136ed61
-
SHA256
9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1
-
SHA512
521e91828ed5462f40dabb7e9858e8912575cb2183f57b31c9acd57ed2e95fc26d517c092cc0c44cb837d1175a5b3c9bc0617becb57f301797ac8a949008ee30
-
SSDEEP
6144:k4nqu9/sfOVv1sukMPL3tcXdr33DS6fqiP7ITsq:k4nL/s23sxyKtrHDpqiP7
Static task
static1
Behavioral task
behavioral1
Sample
9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Targets
-
-
Target
9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1
-
Size
340KB
-
MD5
258b594d256e8698142efe18067b9dc8
-
SHA1
7b0cf847003712b9b95131063d6c7102c136ed61
-
SHA256
9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1
-
SHA512
521e91828ed5462f40dabb7e9858e8912575cb2183f57b31c9acd57ed2e95fc26d517c092cc0c44cb837d1175a5b3c9bc0617becb57f301797ac8a949008ee30
-
SSDEEP
6144:k4nqu9/sfOVv1sukMPL3tcXdr33DS6fqiP7ITsq:k4nL/s23sxyKtrHDpqiP7
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-