General
-
Target
d4cb3f4a5554ec5411cc328cffb5ee564a2114446cbd2.exe
-
Size
235KB
-
Sample
230109-p41rnahf7v
-
MD5
ddfa4b4f9123e72e7b86f10cdd994a83
-
SHA1
5efe2f2980c2fbb50d8f44271037293402667737
-
SHA256
d4cb3f4a5554ec5411cc328cffb5ee564a2114446cbd2c9b27dd5125b15b30b4
-
SHA512
0988ef4bb20ef54e7a8457241c4c207998c49c4664d83895e85d0359098e8c2337b6e31a2cce966516c91182604c8fc04d605c83340a569ea9fe77d7ddc71f9a
-
SSDEEP
6144:KbxUDsiH4X/Et6xXQ31UrhfSK6uVyWVYVtGgUO:KbQOXUghSuVyWVE7
Behavioral task
behavioral1
Sample
d4cb3f4a5554ec5411cc328cffb5ee564a2114446cbd2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.65
62.204.41.32/8bmdh3Slb2/index.php
77.73.134.27/8bmdh3Slb2/index.php
Extracted
https://ciadecompras.com/stubs/Encoding.txt
Extracted
https://ciadecompras.com/stubs/Disable.txt
Extracted
https://ciadecompras.com/SilverClient.exe
Extracted
redline
shura
62.204.41.211:4065
-
auth_value
2f02f1c9ca2536317ad1d99107fe7cf1
Extracted
redline
Naskopro1001
82.115.223.15:15486
-
auth_value
2758e9c533872760f08a9c6118f6721e
Extracted
amadey
3.63
62.204.41.91/8kcnjd3da3/index.php
Extracted
redline
@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)
151.80.89.233:13553
-
auth_value
fbee175162920530e6bf470c8003fa1a
Extracted
vidar
1.8
817
https://t.me/year2023start
https://steamcommunity.com/profiles/76561199467421923
-
profile_id
817
Extracted
redline
1
80.66.87.22:80
-
auth_value
988640d4b8a8e5204910f6d6a0e74af3
Targets
-
-
Target
d4cb3f4a5554ec5411cc328cffb5ee564a2114446cbd2.exe
-
Size
235KB
-
MD5
ddfa4b4f9123e72e7b86f10cdd994a83
-
SHA1
5efe2f2980c2fbb50d8f44271037293402667737
-
SHA256
d4cb3f4a5554ec5411cc328cffb5ee564a2114446cbd2c9b27dd5125b15b30b4
-
SHA512
0988ef4bb20ef54e7a8457241c4c207998c49c4664d83895e85d0359098e8c2337b6e31a2cce966516c91182604c8fc04d605c83340a569ea9fe77d7ddc71f9a
-
SSDEEP
6144:KbxUDsiH4X/Et6xXQ31UrhfSK6uVyWVYVtGgUO:KbQOXUghSuVyWVE7
-
Detect Amadey credential stealer module
-
Detected phishing page
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-