General
-
Target
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
-
Size
185KB
-
Sample
221124-tw4wkaad3s
-
MD5
955b9f8253053d0c87825ac9b634664b
-
SHA1
5614644467c51e007049d8df1b4410b54e6dfc58
-
SHA256
e7868adf9cefb014b481f3c29067695893455e210e1a25912912cc78bae432ea
-
SHA512
3907aeb82028a9622b7b1f13f59c629217c10992e90ad1983d0670e302f482e4c34d1d7d51323a1f8a4b287b699b4cdb8e360a70b7a7476c204fd1500bc85455
-
SSDEEP
3072:tuL4bt5HSJsZydIuD4uEEjpT2AbGzBhG2QI/OC+INzljGiFBQFJWJiUQ7x4Ay/:tjx5nNQREENT2yGzNQK3tG6QFJWIvy/
Static task
static1
Behavioral task
behavioral1
Sample
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Extracted
redline
Testing.v1
185.106.92.111:2510
-
auth_value
336be733d6f6d74b812efad48d422273
Targets
-
-
Target
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
-
Size
244KB
-
MD5
03e4f75c45659084bc8b63e7762d8969
-
SHA1
a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
-
SHA256
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
-
SHA512
2bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
SSDEEP
3072:5sWWuKJ/k/zv2UFWVLx8QFcP5wU3RE65BhG2QI/OCyINzljGiFBQbJWJiUQ7xBtT:ZWl/QWVLx8AdJ4NQK3pG6QbJWIvJRt
-
Detect Amadey credential stealer module
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-