General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241104-v568qatfra
-
MD5
8e05c72da260ffa2255ca5b309377959
-
SHA1
14031a40973ef9851a9e6dd2d1843b00247c32f0
-
SHA256
229e859dda6cc0bc99a395824f4524693bdd0292b4b9c55d06b4fa38279b3ea2
-
SHA512
7d892604849fc3813913789659d101ac7533dd78bd06a5bb5a6f9bc4bab04a6b5775c55dcd3c76226324351df8e540d512da6c267d2dcd00b440e330f85ab703
-
SSDEEP
24576:dyHo8DR+yHRO8U4EkyicLd4nkszZZz169AHg4XHXQn9rpWwRGNRXhSYOID:4X4yxO8U4UicLC1ZZy4XgnlpxYN
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
plost
77.91.124.86:19084
Extracted
amadey
3.89
04d170
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
8e05c72da260ffa2255ca5b309377959
-
SHA1
14031a40973ef9851a9e6dd2d1843b00247c32f0
-
SHA256
229e859dda6cc0bc99a395824f4524693bdd0292b4b9c55d06b4fa38279b3ea2
-
SHA512
7d892604849fc3813913789659d101ac7533dd78bd06a5bb5a6f9bc4bab04a6b5775c55dcd3c76226324351df8e540d512da6c267d2dcd00b440e330f85ab703
-
SSDEEP
24576:dyHo8DR+yHRO8U4EkyicLd4nkszZZz169AHg4XHXQn9rpWwRGNRXhSYOID:4X4yxO8U4UicLC1ZZy4XgnlpxYN
-
Amadey family
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Smokeloader family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1