General
-
Target
DMVideo.exe
-
Size
353KB
-
Sample
210518-j1epb7f7re
-
MD5
592c1cc435037d3cdc583e4b9ba1eec2
-
SHA1
7327e12960157f0a1077ae23193f4848398da801
-
SHA256
14d3995a5466c357fff817ac63a96da2f34c59453e1cbc28ba0315aef1c43cf8
-
SHA512
617da76d6e42e3e18d1f01e1af24bccc47cff08e7d09b6bc25d8d9642f5ab36c50cef461b431a1fe38d8846a54faa278e8f6e106a103b55f1cf46587dd9e7e3a
Static task
static1
Behavioral task
behavioral1
Sample
DMVideo.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
DMVideo.exe
Resource
win10v20210410
Malware Config
Extracted
redline
magsik
185.215.113.45:3722
Targets
-
-
Target
DMVideo.exe
-
Size
353KB
-
MD5
592c1cc435037d3cdc583e4b9ba1eec2
-
SHA1
7327e12960157f0a1077ae23193f4848398da801
-
SHA256
14d3995a5466c357fff817ac63a96da2f34c59453e1cbc28ba0315aef1c43cf8
-
SHA512
617da76d6e42e3e18d1f01e1af24bccc47cff08e7d09b6bc25d8d9642f5ab36c50cef461b431a1fe38d8846a54faa278e8f6e106a103b55f1cf46587dd9e7e3a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-