General
-
Target
e56c948109c9c5812c681365f80db8e9.exe
-
Size
706KB
-
Sample
230702-cxz6bsbe5t
-
MD5
e56c948109c9c5812c681365f80db8e9
-
SHA1
8345c476b1b7f22860a01a65f5fdaca9acb373a8
-
SHA256
73bb4d8a06bfd09efea5d6c0a9dae34cb796e61114589097e7ba7bace5cdb43d
-
SHA512
a2682ea264ade51249f7fa1794cbf8f357ea81a1971dc63e9399b9ddb38a8759189b5829efb6a948bf65eabf44b59f148d90d555cbdc0caddcfb6ab36fed03d7
-
SSDEEP
12288:2/cH/Q2PBskm/AeeyYOVWHBvllZUyEdN9TB7RHLbYEy/4gMQdQZ:2/cHBpm/FSHpBg7lL8Ey/u
Static task
static1
Behavioral task
behavioral1
Sample
e56c948109c9c5812c681365f80db8e9.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
e56c948109c9c5812c681365f80db8e9.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
redline
narko
83.97.73.134:19071
-
auth_value
a9d8c6db81c7e486f5832bc2ee48cb84
Extracted
amadey
3.81
95.214.27.98/cronus/index.php
Extracted
redline
@rocketprosupport1
104.211.55.2:80
-
auth_value
d3e217c2eab07f2abc41ade13a666e65
Targets
-
-
Target
e56c948109c9c5812c681365f80db8e9.exe
-
Size
706KB
-
MD5
e56c948109c9c5812c681365f80db8e9
-
SHA1
8345c476b1b7f22860a01a65f5fdaca9acb373a8
-
SHA256
73bb4d8a06bfd09efea5d6c0a9dae34cb796e61114589097e7ba7bace5cdb43d
-
SHA512
a2682ea264ade51249f7fa1794cbf8f357ea81a1971dc63e9399b9ddb38a8759189b5829efb6a948bf65eabf44b59f148d90d555cbdc0caddcfb6ab36fed03d7
-
SSDEEP
12288:2/cH/Q2PBskm/AeeyYOVWHBvllZUyEdN9TB7RHLbYEy/4gMQdQZ:2/cHBpm/FSHpBg7lL8Ey/u
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-