General
-
Target
6e424ff0432c158093d366142f45d27d566be62ab901b4069cb034654641e765
-
Size
186KB
-
Sample
221123-p47vzaga8t
-
MD5
ae2a0fe63812c5b6765b572e34c99046
-
SHA1
35d31b3d9d9e22394c07052c26d34aee51713c9e
-
SHA256
6e424ff0432c158093d366142f45d27d566be62ab901b4069cb034654641e765
-
SHA512
05522b4bd326936bf7c5dbbf0a465899815f72eac1e48b1cce85d2343fb30eea5dcc156b5b111c78d554eecfff757f6a0ec07f8de3ab2493e2d23a3d421f07c5
-
SSDEEP
3072:5DuM1w6kL5LcWmk+O5zc3wwW5VgtCdWWlOfii2:9uTL5LcnkK9W5OtUWWofi
Static task
static1
Behavioral task
behavioral1
Sample
6e424ff0432c158093d366142f45d27d566be62ab901b4069cb034654641e765.exe
Resource
win10-20220901-en
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Extracted
redline
KRIPT
212.8.246.157:32348
-
auth_value
80ebe4bab7a98a7ce9c75989ff9f40b4
Extracted
redline
NanoID2022
185.106.92.111:2510
-
auth_value
d5913c276c6c8b5735246051bef9a412
Targets
-
-
Target
6e424ff0432c158093d366142f45d27d566be62ab901b4069cb034654641e765
-
Size
186KB
-
MD5
ae2a0fe63812c5b6765b572e34c99046
-
SHA1
35d31b3d9d9e22394c07052c26d34aee51713c9e
-
SHA256
6e424ff0432c158093d366142f45d27d566be62ab901b4069cb034654641e765
-
SHA512
05522b4bd326936bf7c5dbbf0a465899815f72eac1e48b1cce85d2343fb30eea5dcc156b5b111c78d554eecfff757f6a0ec07f8de3ab2493e2d23a3d421f07c5
-
SSDEEP
3072:5DuM1w6kL5LcWmk+O5zc3wwW5VgtCdWWlOfii2:9uTL5LcnkK9W5OtUWWofi
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-