General
-
Target
d9b0a9c06e7fac14fc3891a4378bccd424998a7c71c193ca4cf5062e6975f7b7
-
Size
1.9MB
-
Sample
241109-b6qsksvbrb
-
MD5
3d9b5964bde8a0af79fa67f50d1c14ea
-
SHA1
2ab618c2eb116cc0d482d3133e152e49a0245b67
-
SHA256
d9b0a9c06e7fac14fc3891a4378bccd424998a7c71c193ca4cf5062e6975f7b7
-
SHA512
312e889ee670969bd513178ace2ba862a00610892bd482b555df79a7def7f776a4943da9dca79de9a0e6aae287dd94154c10f3afc37593ce403134ea347b8100
-
SSDEEP
49152:y5Vapp/+VqKzZkn/obBS9n9uy6QRxs93yfcpkUPEK/zFeNOlm:X/+Vqmkn/ob2nf6ywia7NY0lm
Static task
static1
Behavioral task
behavioral1
Sample
asd/HackLoader.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
asd/HackLoader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
asd/asd.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
asd/asd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
1
138.124.180.59:88
Targets
-
-
Target
asd/HackLoader.dll
-
Size
72KB
-
MD5
0c9431ab4b97ec156e54e73ff372da97
-
SHA1
a294b73236ab3e19afd5e00b496eedc29015b678
-
SHA256
e29f74d1f86bce700a3ed027603531bcc7c58a5e0afd5ec22461534453a464cd
-
SHA512
0608df1d1d004eff16474fd427b925cc950c5fb31a18e7632cbb8d531730ce0b2fde9b8b561a0327efe52a65d1d3c58bd87ad8cb3fe2e9a155ae4cf5ca51253d
-
SSDEEP
1536:aK1c4nxybxPpTCnygbcR+1f4AQaH2Jt1Ixjx+9zUvAEv5XV:/9UPpTCTbpfL5Hu0kzUvAMP
Score1/10 -
-
-
Target
asd/asd.exe
-
Size
1.9MB
-
MD5
cc534308f17c36ccc99b06fc2d871b88
-
SHA1
2b48a106d38be3dae4add81ac4a78deece210e4d
-
SHA256
c68189a418b307e204e8771acc84d9d5cec0d1f9aa2c1290208fa15a9fdda017
-
SHA512
ffa32e4e536aa2eb6d1aec5dca72258d5fe4ccba005601d43c0fd3feda0a4e9bdbc23775fd28deec8702c4db7ce07e181f5ab77d6b5546d4087748b6d6d03289
-
SSDEEP
49152:ufVl2iMzzVhHVsX0NLFtP6O83XxPR7FIYNMIc8qH3Lc:IlezzV1VsXyLFtP61HxzIYNM7JA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1