General
-
Target
84626c0f9af8f3edb65297fc1da15671ad102dec2ba6a09d37f9108f972db985
-
Size
1.8MB
-
Sample
240728-h41y4ayaqb
-
MD5
fb391abce14a662fa58746128451f256
-
SHA1
9bc59b42521c554de5e9bab81b74cedd476f78d6
-
SHA256
84626c0f9af8f3edb65297fc1da15671ad102dec2ba6a09d37f9108f972db985
-
SHA512
5a066ba1d90890875829fb630a743faa4442bec2fc3f2daa99bef1b3739ed2f3b72fc098df0395e4316b1a8574c9d0cc14f3802b105965dc9aff84877b288bd5
-
SSDEEP
49152:9jFJxF/4N5PP/vWX12Y4BxnEXFInk2m9HPE7RUBXRw:X7FgTvWXo9EXFy2vEORi
Static task
static1
Behavioral task
behavioral1
Sample
78305c8b5e8ead6989a0af09fc6ed8f2ff1b246c0487dfa78fb5b155b554cae9.exe
Resource
win7-20240705-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
25072023
185.215.113.67:40960
Extracted
redline
Logs
185.215.113.9:9137
Targets
-
-
Target
78305c8b5e8ead6989a0af09fc6ed8f2ff1b246c0487dfa78fb5b155b554cae9.exe
-
Size
1.8MB
-
MD5
8ef54b7689af3a0fe5028bc42964bb26
-
SHA1
debcb0ea69e4330873f281b0d9b34d15fc513abc
-
SHA256
78305c8b5e8ead6989a0af09fc6ed8f2ff1b246c0487dfa78fb5b155b554cae9
-
SHA512
8b2ee0c290a48f826bacaeaf949d7335b14f65dc8967d0bcb05ad386fda9faf5d6d016d66ce202cd7be202eaf1981b6b17bb60dae33dc085f28aab9be9d3986b
-
SSDEEP
49152:5qE17IghRPKUd2LI/WYW+jNTxjgafw8TfzYBgx1ITA:5HdkRnSNTBg2/ug3WA
-
Detects Monster Stealer.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2