General
-
Target
911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f.exe
-
Size
286KB
-
Sample
221105-vw1pksbagp
-
MD5
344ae70f0027932c5f5b72bd0cab63ef
-
SHA1
21456605f853367fabc573190a6599273104c8e5
-
SHA256
911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f5ce733dada7abbf7c86
-
SHA512
e5212436cc7f697b547980c6d8d54876b102591773151ef97336543e2787f09c2f1686fe284f0193ccb950e515553d9540f3317ce20c0db4a9a85917b0116032
-
SSDEEP
3072:eLquc0aggYLf5qcTrDzsKuUq08xWrfG0b+/GryXxnUs:Wq8GYk4xpq08xWa0a//hUs
Static task
static1
Behavioral task
behavioral1
Sample
911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Extracted
redline
45.15.156.52:45
-
auth_value
19cd76dae6d01d9649fd29624fa61e51
Extracted
redline
@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)
151.80.89.233:13553
-
auth_value
fbee175162920530e6bf470c8003fa1a
Extracted
redline
1.0.1
148.163.81.19:38619
-
auth_value
590d569fc729419091688ae460e2ae4d
Targets
-
-
Target
911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f.exe
-
Size
286KB
-
MD5
344ae70f0027932c5f5b72bd0cab63ef
-
SHA1
21456605f853367fabc573190a6599273104c8e5
-
SHA256
911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f5ce733dada7abbf7c86
-
SHA512
e5212436cc7f697b547980c6d8d54876b102591773151ef97336543e2787f09c2f1686fe284f0193ccb950e515553d9540f3317ce20c0db4a9a85917b0116032
-
SSDEEP
3072:eLquc0aggYLf5qcTrDzsKuUq08xWrfG0b+/GryXxnUs:Wq8GYk4xpq08xWa0a//hUs
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-