General
-
Target
ac3e3692ed2f66f4e6227cc86df0283c.exe
-
Size
1.1MB
-
Sample
211024-pzmn8sfagn
-
MD5
ac3e3692ed2f66f4e6227cc86df0283c
-
SHA1
b1b4a77aa6c0ccf203ab08f8a8359a736ee03b2a
-
SHA256
6a8380cdaf3d012f2373f6919bbd2ee6c21ae43dd16d29c999528189057ccf1d
-
SHA512
893ce7687f232024f80635a06ea7e711dace41dfb9bf687ba47ace7d9010a67a6e9e8ceb6ccb23bb6c5a5dda1451c380f88c8e6ad1ffedb9f7c39c20420e5397
Static task
static1
Behavioral task
behavioral1
Sample
ac3e3692ed2f66f4e6227cc86df0283c.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
ac3e3692ed2f66f4e6227cc86df0283c.exe
Resource
win10-en-20211014
Malware Config
Extracted
redline
2
146.0.75.231:80
Targets
-
-
Target
ac3e3692ed2f66f4e6227cc86df0283c.exe
-
Size
1.1MB
-
MD5
ac3e3692ed2f66f4e6227cc86df0283c
-
SHA1
b1b4a77aa6c0ccf203ab08f8a8359a736ee03b2a
-
SHA256
6a8380cdaf3d012f2373f6919bbd2ee6c21ae43dd16d29c999528189057ccf1d
-
SHA512
893ce7687f232024f80635a06ea7e711dace41dfb9bf687ba47ace7d9010a67a6e9e8ceb6ccb23bb6c5a5dda1451c380f88c8e6ad1ffedb9f7c39c20420e5397
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-