Resubmissions
10-05-2021 11:09
210510-cdf8nml7an 10General
-
Target
e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148
-
Size
1.6MB
-
Sample
210510-cdf8nml7an
-
MD5
16a11f50f6925fca61040f2e0a834b89
-
SHA1
4179ea5b096750082e177dddedf3a46f1576ef91
-
SHA256
e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148
-
SHA512
309b46e3e09e77a96a3ecc06a06a62fc7111e15383aefb8eed8c9be11c700774749d55f6dd7e2fb172bc74525a52c888e9aac6c49b217e4a0bc3b247676a075c
Static task
static1
Behavioral task
behavioral1
Sample
e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148.exe
Resource
win7v20210410
Malware Config
Extracted
redline
zastaredan.xyz:80
Extracted
icedid
687839456
icouldmakeyoubelieve.top
Targets
-
-
Target
e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148
-
Size
1.6MB
-
MD5
16a11f50f6925fca61040f2e0a834b89
-
SHA1
4179ea5b096750082e177dddedf3a46f1576ef91
-
SHA256
e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148
-
SHA512
309b46e3e09e77a96a3ecc06a06a62fc7111e15383aefb8eed8c9be11c700774749d55f6dd7e2fb172bc74525a52c888e9aac6c49b217e4a0bc3b247676a075c
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-