General
-
Target
36a4ba2dad6e06df77529af80e49071f3d65980a08ee8067cbd989669a189815
-
Size
1023KB
-
Sample
230421-rjmqeahh4v
-
MD5
b0ef030464af380409831acf78eef3b7
-
SHA1
0c956e54501dbb3abdc8991c12e9febf62f1d36d
-
SHA256
36a4ba2dad6e06df77529af80e49071f3d65980a08ee8067cbd989669a189815
-
SHA512
9675f97fc7aa483d5588cefb116147b9ff8a3c6e945721a1bab5c573e7f4d75ee6e6476c8674f67df683d3da0ba097c677d8cff7ebb741bf0d57d3151846107d
-
SSDEEP
24576:by5TZG/vOpT+pqbxqxHF4TioX+11PIpZLjT3DQKnnj0xM:O5TZGXOpT+3xCT9X+HILLfMKnAx
Static task
static1
Behavioral task
behavioral1
Sample
36a4ba2dad6e06df77529af80e49071f3d65980a08ee8067cbd989669a189815.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
special
176.123.9.142:14845
-
auth_value
bb28ee957fad348ef1dfce97134849bc
Extracted
redline
cheat
62.108.37.195:16060
Extracted
redline
Heavan Dave
199.115.193.116:15763
-
auth_value
53923b5ff123b63db4445e5dfd21c16f
Targets
-
-
Target
36a4ba2dad6e06df77529af80e49071f3d65980a08ee8067cbd989669a189815
-
Size
1023KB
-
MD5
b0ef030464af380409831acf78eef3b7
-
SHA1
0c956e54501dbb3abdc8991c12e9febf62f1d36d
-
SHA256
36a4ba2dad6e06df77529af80e49071f3d65980a08ee8067cbd989669a189815
-
SHA512
9675f97fc7aa483d5588cefb116147b9ff8a3c6e945721a1bab5c573e7f4d75ee6e6476c8674f67df683d3da0ba097c677d8cff7ebb741bf0d57d3151846107d
-
SSDEEP
24576:by5TZG/vOpT+pqbxqxHF4TioX+11PIpZLjT3DQKnnj0xM:O5TZGXOpT+3xCT9X+HILLfMKnAx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-