General
-
Target
c240b16213e3f2449115ce1072cbc4c14b10409a31a3907b33d3e437f9f728d5
-
Size
297KB
-
Sample
221114-y113pahg5v
-
MD5
8d52ee18342a15cf9f3850db2d3d8c5d
-
SHA1
d3e0e002950547bee7fef9569be9e9e18d384433
-
SHA256
c240b16213e3f2449115ce1072cbc4c14b10409a31a3907b33d3e437f9f728d5
-
SHA512
c9c0fa035a8773d963141bfa567576068e5542c7e5aa178bba8c6a95fbe68519437e0bc44867b0ee2e931d8d8699abebf2cc5a36c4affd73b1b277a2a3a7a49f
-
SSDEEP
6144:AYy1KLSHORK+LANIIlw8cpipwL54/HtNfIEndTQ:AYaKOHORV6w8c8pwL5ofIUdT
Static task
static1
Behavioral task
behavioral1
Sample
c240b16213e3f2449115ce1072cbc4c14b10409a31a3907b33d3e437f9f728d5.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
45.15.156.37:110
-
auth_value
19cd76dae6d01d9649fd29624fa61e51
Extracted
redline
123
78.153.144.3:2510
-
auth_value
cd6abb0af211bce081d7bf127cc26835
Extracted
redline
rozena1114
jalocliche.xyz:81
chardhesha.xyz:81
-
auth_value
9fefd743a3b62bcd7c3e17a70fbdb3a8
Targets
-
-
Target
c240b16213e3f2449115ce1072cbc4c14b10409a31a3907b33d3e437f9f728d5
-
Size
297KB
-
MD5
8d52ee18342a15cf9f3850db2d3d8c5d
-
SHA1
d3e0e002950547bee7fef9569be9e9e18d384433
-
SHA256
c240b16213e3f2449115ce1072cbc4c14b10409a31a3907b33d3e437f9f728d5
-
SHA512
c9c0fa035a8773d963141bfa567576068e5542c7e5aa178bba8c6a95fbe68519437e0bc44867b0ee2e931d8d8699abebf2cc5a36c4affd73b1b277a2a3a7a49f
-
SSDEEP
6144:AYy1KLSHORK+LANIIlw8cpipwL54/HtNfIEndTQ:AYaKOHORV6w8c8pwL5ofIUdT
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-