General
-
Target
194D0361BDC50ABB8479B29934FCEDDE.exe
-
Size
220KB
-
Sample
210721-mlc96pe8na
-
MD5
194d0361bdc50abb8479b29934fcedde
-
SHA1
5b8023acb941df513bd28c48e46b2fa4e8a7b7a5
-
SHA256
29016d532a8c967c49aa06b8688541b08d984f0fe807f380742d187595681830
-
SHA512
93705ce8e8afbb00bf88a1ef1409667652956d56738c52095973890b34ba6c02a4f5962079a2c68bb9950ab378987d9dfa907a121c06f75c5824b85ad62aade8
Static task
static1
Behavioral task
behavioral1
Sample
194D0361BDC50ABB8479B29934FCEDDE.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
194D0361BDC50ABB8479B29934FCEDDE.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
194D0361BDC50ABB8479B29934FCEDDE.exe
-
Size
220KB
-
MD5
194d0361bdc50abb8479b29934fcedde
-
SHA1
5b8023acb941df513bd28c48e46b2fa4e8a7b7a5
-
SHA256
29016d532a8c967c49aa06b8688541b08d984f0fe807f380742d187595681830
-
SHA512
93705ce8e8afbb00bf88a1ef1409667652956d56738c52095973890b34ba6c02a4f5962079a2c68bb9950ab378987d9dfa907a121c06f75c5824b85ad62aade8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-