General
-
Target
JC_1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d
-
Size
6.6MB
-
Sample
230903-lf16qsgh4z
-
MD5
c95b05b54c227d7a5715b452975141c6
-
SHA1
02c63c6b8e0ae4d232cbee2348d6a43a5e015a3c
-
SHA256
1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d
-
SHA512
8516e5ef329bff892d361fa9ffe2e14730ed2a4341a21051779cf0b1793eaebd6e456ff9dd79ae3dc276e21da9968c283b07ea684a0546a03427660f862d6f4b
-
SSDEEP
196608:PDHuu55eRkhK6fQ3rGWhF4V1CB7fFZrVhAAGmpDZRkEXafPD:rOuqio6fcrniarFbf1PaPD
Behavioral task
behavioral1
Sample
JC_1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe
Resource
win7-20230831-en
Malware Config
Extracted
amadey
3.88
5.42.64.33/vu3skClDn/index.php
-
install_dir
0ac15cf625
-
install_file
yiueea.exe
-
strings_key
23e63d80d583519d75db46f354137051
Extracted
redline
010923
happy1sept.tuktuk.ug:11290
-
auth_value
8338bf26f599326ee45afe9d54f7ef8e
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Targets
-
-
Target
JC_1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d
-
Size
6.6MB
-
MD5
c95b05b54c227d7a5715b452975141c6
-
SHA1
02c63c6b8e0ae4d232cbee2348d6a43a5e015a3c
-
SHA256
1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d
-
SHA512
8516e5ef329bff892d361fa9ffe2e14730ed2a4341a21051779cf0b1793eaebd6e456ff9dd79ae3dc276e21da9968c283b07ea684a0546a03427660f862d6f4b
-
SSDEEP
196608:PDHuu55eRkhK6fQ3rGWhF4V1CB7fFZrVhAAGmpDZRkEXafPD:rOuqio6fcrniarFbf1PaPD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1