General
-
Target
4ce1a06a482a8456062fc344861b993a2d825f5b2038d92c5da1ff1b63ebf72c
-
Size
1.3MB
-
Sample
230912-qybq1sfe99
-
MD5
df6bd8a52f1288b6f7522446c652304b
-
SHA1
26c72f63a8d0fcc160fb44aa0f16698e2e460c8e
-
SHA256
093633adb83458e238c55c8eca405986d8f646e533e2d31d7bbc8182f143dcef
-
SHA512
4b1e6a7a39875e17a833a48c475daf4703d5929acc5e31b956b41fb9088ffc463609c56ff5c6eea24ddcb905c069991711e7a91065e9f35dd686290c9a43c779
-
SSDEEP
24576:nXwM2H5ifMwc/zhcweMx42Hh+hjoA6sTuL/Lsf0Sbh4U54Kt+Ji/TGZoP/A:nF2HYklveMa2Hh+mA6sTdTF3tii3I
Static task
static1
Behavioral task
behavioral1
Sample
4ce1a06a482a8456062fc344861b993a2d825f5b2038d92c5da1ff1b63ebf72c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4ce1a06a482a8456062fc344861b993a2d825f5b2038d92c5da1ff1b63ebf72c.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Extracted
redline
tuco
77.91.124.82:19071
-
auth_value
dcfeb759bae9232de006fc3a4b34ac53
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Targets
-
-
Target
4ce1a06a482a8456062fc344861b993a2d825f5b2038d92c5da1ff1b63ebf72c
-
Size
1.4MB
-
MD5
d48ed9782c4530e04a4d6ab826448acd
-
SHA1
96cc378d575bbaecbe3b6a0e4800bdbc04b31c38
-
SHA256
4ce1a06a482a8456062fc344861b993a2d825f5b2038d92c5da1ff1b63ebf72c
-
SHA512
f9af992dc8ad2187aa5225188f02edeb9cd4e678b5c29a3848d188975b8ba97a9b09550b4baae80f17eb8f3358cf14fc3a1dcd5c7c77caf8dd1c93868d1f83fe
-
SSDEEP
24576:AWnkfGnbsl/gqWu64y9uksNujHLsfW6bh6s5QBuJsVBGb5c:3kubsZOuksNdXF4Ssg5c
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Impair Defenses
1Disable or Modify Tools
1Scripting
1