General
-
Target
90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
-
Size
238KB
-
Sample
230508-3nhsssfb5x
-
MD5
c23d62c9166ae248fe9fe078328182f9
-
SHA1
ce684054121205b1cd7befc016644680fd5b29d5
-
SHA256
90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
-
SHA512
1f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
SSDEEP
6144:qZOKsgHE8srZb6sbJ42UqQqcuFCXogRNEFWa0:RpBJuqsuFCXogRNI0
Behavioral task
behavioral1
Sample
90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
amadey
3.70
tadogem.com/dF30Hn4m/index.php
Extracted
redline
135.181.11.39:21717
-
auth_value
8371c94cfa5b9230afb9ccb73536d331
Extracted
systembc
65.21.119.52:4277
localhost.exchange:4277
Targets
-
-
Target
90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
-
Size
238KB
-
MD5
c23d62c9166ae248fe9fe078328182f9
-
SHA1
ce684054121205b1cd7befc016644680fd5b29d5
-
SHA256
90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
-
SHA512
1f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
SSDEEP
6144:qZOKsgHE8srZb6sbJ42UqQqcuFCXogRNEFWa0:RpBJuqsuFCXogRNI0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-