General
-
Target
0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10
-
Size
1.1MB
-
Sample
241111-cq4j6stmcq
-
MD5
39cd5f8cd54bc4cc879b3fe565b38220
-
SHA1
079ec0f55b38aec6471805e99102e7c9446b83e0
-
SHA256
0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10
-
SHA512
7e2bbeda55698aafb5be3c8e2a2e6e2b5faa228d894056c1ed59a6f1f6a51299e334a78944b394901292bf882e4a8e8b1a0e74162002a2f31ee926fe16664969
-
SSDEEP
24576:wy8IEDHJ0YrxtvEk9Rx6mUPdMA2NPWmOvFUMbA6dFps:3hEDXr/EY1OdM/PWmGA6dT
Static task
static1
Behavioral task
behavioral1
Sample
0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
maika
185.161.248.75:4132
-
auth_value
33d7e882888973bf73e1c1c697a5cc73
Extracted
amadey
3.81
f9a925
http://77.91.124.20
-
install_dir
c3912af058
-
install_file
oneetx.exe
-
strings_key
0504ce46646b0dc397a3c30d6692ec75
-
url_paths
/store/games/index.php
Extracted
redline
fuga
185.161.248.75:4132
-
auth_value
7c5144ad645deb9fa21680fdaee0d51f
Targets
-
-
Target
0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10
-
Size
1.1MB
-
MD5
39cd5f8cd54bc4cc879b3fe565b38220
-
SHA1
079ec0f55b38aec6471805e99102e7c9446b83e0
-
SHA256
0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10
-
SHA512
7e2bbeda55698aafb5be3c8e2a2e6e2b5faa228d894056c1ed59a6f1f6a51299e334a78944b394901292bf882e4a8e8b1a0e74162002a2f31ee926fe16664969
-
SSDEEP
24576:wy8IEDHJ0YrxtvEk9Rx6mUPdMA2NPWmOvFUMbA6dFps:3hEDXr/EY1OdM/PWmGA6dT
-
Amadey family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1