General
-
Target
a4aab901f5f4662d75a66bdb08971148.bin
-
Size
745KB
-
Sample
230613-b2ppqaeh71
-
MD5
8fc199774aa24af77b684d68ab8c1c34
-
SHA1
4015f4aad01ea91eebdf2dbe85f4092c4448843d
-
SHA256
dc17eaee2a8b3656a506655ba2a72ebc8b306c1f1a85d54d4b7a544f0baf2808
-
SHA512
630c58d0d4199caede48c59f8fe6568551912efcd7df343f3d51a7a94fc2878569b3ef3df34ed3f15c8e9aa2fbb05f18711017713b5bd63f6bdd856988d296de
-
SSDEEP
12288:v0CeDhE9+dxgucJbJyX41RpzkfcbWNWVcMwp5vU692ux4bwvJa0wQCDvabJ4P/MD:sBtq+dmJbS41Rylacrpf238vJ7wQoSbF
Static task
static1
Behavioral task
behavioral1
Sample
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
090623_11_red
goodlogs.neverever.ug:11615
-
auth_value
ca62706abf6895102883ab0c8a86ddff
Extracted
amadey
3.80
45.15.156.208/jd9dd3Vw/index.php
second.amadgood.com/jd9dd3Vw/index.php
Extracted
redline
MeAm
165.22.100.96:81
-
auth_value
a978b0ab23ddf47bb972278e7b486593
Extracted
laplas
http://45.159.189.105
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Targets
-
-
Target
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe
-
Size
1.7MB
-
MD5
a4aab901f5f4662d75a66bdb08971148
-
SHA1
9835bae8776e280b5a6bcf8e204d1bca5e05b0f6
-
SHA256
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c
-
SHA512
a4a86338d24118d20242714da4ac9df72a0954c7c7cfa4be80cb2495b2ced651e328b4fbf1e66ac844f76f838efd591baade7b2dca019917964ac0b7a73c479f
-
SSDEEP
24576:YwJAcH22+6MA333QaUozWal46B7Owg/63wXByw/OK:bJAcH22KA3339UPaewgrByq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-