General
-
Target
af36687605cc5623fc314ecf59790b775f2790d333e5fbd429ce3e78ba95ade0
-
Size
1.0MB
-
Sample
230421-skkswaab8z
-
MD5
e1151e24ad25925b467c077e01775169
-
SHA1
34dacfcdafa330959011f82258d1f64e2b5dd9a1
-
SHA256
af36687605cc5623fc314ecf59790b775f2790d333e5fbd429ce3e78ba95ade0
-
SHA512
d343a0d3b06c7fa35e19122cacff56f86f4e690a83bb1e4b6456a3e6eb93e1f775896325f84af370cdce823159b099c0dbb8da0ad4ec9d5199a34c288a1aa24a
-
SSDEEP
24576:EyUolKhd97ui/T9dm+/NssGpLiVBLSRPx/mjzA2OsXNrx3GGr3JYUYy3:T/29EsG+B2NdMFhx3J3+UY
Static task
static1
Behavioral task
behavioral1
Sample
af36687605cc5623fc314ecf59790b775f2790d333e5fbd429ce3e78ba95ade0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
special
176.123.9.142:14845
-
auth_value
bb28ee957fad348ef1dfce97134849bc
Extracted
redline
cheat
62.108.37.195:16060
Extracted
redline
Heavan Dave
199.115.193.116:15763
-
auth_value
53923b5ff123b63db4445e5dfd21c16f
Targets
-
-
Target
af36687605cc5623fc314ecf59790b775f2790d333e5fbd429ce3e78ba95ade0
-
Size
1.0MB
-
MD5
e1151e24ad25925b467c077e01775169
-
SHA1
34dacfcdafa330959011f82258d1f64e2b5dd9a1
-
SHA256
af36687605cc5623fc314ecf59790b775f2790d333e5fbd429ce3e78ba95ade0
-
SHA512
d343a0d3b06c7fa35e19122cacff56f86f4e690a83bb1e4b6456a3e6eb93e1f775896325f84af370cdce823159b099c0dbb8da0ad4ec9d5199a34c288a1aa24a
-
SSDEEP
24576:EyUolKhd97ui/T9dm+/NssGpLiVBLSRPx/mjzA2OsXNrx3GGr3JYUYy3:T/29EsG+B2NdMFhx3J3+UY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-