General
-
Target
b2cff0d377a724cadf0bf0d0e0e267172ac549f0ca1dc.exe
-
Size
1.1MB
-
Sample
230416-m1n8cahh64
-
MD5
455ae162b4b1a8e7d0a468a14449df24
-
SHA1
5610c2357e753dd460b6ee619c5f153a96ef66b7
-
SHA256
b2cff0d377a724cadf0bf0d0e0e267172ac549f0ca1dcf9d6c8e83e2fce737bd
-
SHA512
defbcf32638a6c5bff584d50e619eebf3c4755a811dc556607205b67dc4c6492b0a1090da773893ea070109af8456b15b708e3910407baa9c0f5bd2175306f9a
-
SSDEEP
24576:By/TVqFwGpgWI9zEhu7tH3lLG5dYXZd1qBdGAs5n2txU:0BqFt41LKOvQBdyc
Static task
static1
Behavioral task
behavioral1
Sample
b2cff0d377a724cadf0bf0d0e0e267172ac549f0ca1dc.exe
Resource
win7-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
MrPenguin
86.38.225.74:16808
Extracted
redline
Ghostworker
127.0.0.1:54130
Targets
-
-
Target
b2cff0d377a724cadf0bf0d0e0e267172ac549f0ca1dc.exe
-
Size
1.1MB
-
MD5
455ae162b4b1a8e7d0a468a14449df24
-
SHA1
5610c2357e753dd460b6ee619c5f153a96ef66b7
-
SHA256
b2cff0d377a724cadf0bf0d0e0e267172ac549f0ca1dcf9d6c8e83e2fce737bd
-
SHA512
defbcf32638a6c5bff584d50e619eebf3c4755a811dc556607205b67dc4c6492b0a1090da773893ea070109af8456b15b708e3910407baa9c0f5bd2175306f9a
-
SSDEEP
24576:By/TVqFwGpgWI9zEhu7tH3lLG5dYXZd1qBdGAs5n2txU:0BqFt41LKOvQBdyc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-