General
-
Target
3D29B2A1A23B12A5134FBE8B17FE5BA0C87549E567123.exe
-
Size
1MB
-
Sample
210519-a8jqzs8sv2
-
MD5
033e13c4aca370aeeb8031dbce7bf0b9
-
SHA1
406100cd169260cecdf31914d055b612f678b00e
-
SHA256
3d29b2a1a23b12a5134fbe8b17fe5ba0c87549e5671232eb9e842c2a55ad8f2b
-
SHA512
4aa49c6b70df63bb022b5c7fcd7aef985c503dd21f6994394a4360a98cba4f3283f2dd8e986d9bf23cfe94425286526fff0f5b296a71c364b7a3e05d639ad00f
Static task
static1
Behavioral task
behavioral1
Sample
3D29B2A1A23B12A5134FBE8B17FE5BA0C87549E567123.exe
Resource
win7v20210410
Malware Config
Extracted
redline
EUMX
tstamore.info:80
Extracted
redline
121212
168.119.241.77:60932
Targets
-
-
Target
3D29B2A1A23B12A5134FBE8B17FE5BA0C87549E567123.exe
-
Size
1MB
-
MD5
033e13c4aca370aeeb8031dbce7bf0b9
-
SHA1
406100cd169260cecdf31914d055b612f678b00e
-
SHA256
3d29b2a1a23b12a5134fbe8b17fe5ba0c87549e5671232eb9e842c2a55ad8f2b
-
SHA512
4aa49c6b70df63bb022b5c7fcd7aef985c503dd21f6994394a4360a98cba4f3283f2dd8e986d9bf23cfe94425286526fff0f5b296a71c364b7a3e05d639ad00f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Data from Local System
2Command and Control
Credential Access
Credentials in Files
2Discovery
Query Registry
1Remote System Discovery
1System Information Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation