General
-
Target
0x000600000000072d-163.dat
-
Size
236KB
-
Sample
230203-w45tyaca4y
-
MD5
fde8915d251fada3a37530421eb29dcf
-
SHA1
44386a8947ddfab993409945dae05a772a13e047
-
SHA256
6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
-
SHA512
ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
SSDEEP
6144:+VSoYbL/MOFBtDe+1T9uA/qruVy5NghHgVO:NoH3+uA+uVy5NAqO
Behavioral task
behavioral1
Sample
0x000600000000072d-163.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0x000600000000072d-163.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
62.204.41.88/9vdVVVjsw/index.php
Extracted
redline
gonka
62.204.41.170:4179
-
auth_value
f017b1096da5cc257f8ca109051c5fbb
Extracted
redline
bigdick
185.254.37.212:80
-
auth_value
88290259fe8dc49da48b125d03e6788c
Extracted
redline
85.31.44.66:17742
-
auth_value
e9a89e5b72a729171b1655add99ee280
Targets
-
-
Target
0x000600000000072d-163.dat
-
Size
236KB
-
MD5
fde8915d251fada3a37530421eb29dcf
-
SHA1
44386a8947ddfab993409945dae05a772a13e047
-
SHA256
6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
-
SHA512
ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
SSDEEP
6144:+VSoYbL/MOFBtDe+1T9uA/qruVy5NghHgVO:NoH3+uA+uVy5NAqO
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Modify Registry
3Scripting
1Virtualization/Sandbox Evasion
1