General
-
Target
a581f26565d44c0dfb202873cd9a7e0d.exe
-
Size
788KB
-
Sample
210505-nv8xzp8edn
-
MD5
a581f26565d44c0dfb202873cd9a7e0d
-
SHA1
360a68a465bb314c355cc8b6dff2fc7784086f86
-
SHA256
586871a8aa5c08be02631a432daa373d9e40fdd0dd53b80f0210f53b41dbbfb3
-
SHA512
50f09b875fbc0d79e4d5b22974a56ce6bdc67244339b034e219af736514d7dfd8103d9c5ca013a59ff7ef2fa818d23ec2543bc19d3d72149a771c3e14ecd0de5
Static task
static1
Behavioral task
behavioral1
Sample
a581f26565d44c0dfb202873cd9a7e0d.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
a581f26565d44c0dfb202873cd9a7e0d.exe
Resource
win10v20210410
Malware Config
Extracted
redline
@nicementol
45.90.46.164:54557
Targets
-
-
Target
a581f26565d44c0dfb202873cd9a7e0d.exe
-
Size
788KB
-
MD5
a581f26565d44c0dfb202873cd9a7e0d
-
SHA1
360a68a465bb314c355cc8b6dff2fc7784086f86
-
SHA256
586871a8aa5c08be02631a432daa373d9e40fdd0dd53b80f0210f53b41dbbfb3
-
SHA512
50f09b875fbc0d79e4d5b22974a56ce6bdc67244339b034e219af736514d7dfd8103d9c5ca013a59ff7ef2fa818d23ec2543bc19d3d72149a771c3e14ecd0de5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
XMRig Miner Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-