General
-
Target
63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee
-
Size
877KB
-
Sample
211130-mxfrssefhp
-
MD5
0b7cda3631ee14a0d0c3da4ec649bcc4
-
SHA1
c4ae4859b6aa6721da0ea6502e15e8f27d51ccca
-
SHA256
63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee
-
SHA512
2a9074b7ff70cbc922b89f39aeff5d9a0c5d1a21fa25b7eeedae07683b9359c3b3a2c1f2fa5bdb77860d26340690f11b52d8b0cc55d7bdae624a70e86d13defd
Static task
static1
Behavioral task
behavioral1
Sample
63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee.exe
Resource
win10-en-20211014
Malware Config
Extracted
redline
185.215.113.57:50723
Extracted
redline
LastLovely
95.181.152.177:21142
Targets
-
-
Target
63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee
-
Size
877KB
-
MD5
0b7cda3631ee14a0d0c3da4ec649bcc4
-
SHA1
c4ae4859b6aa6721da0ea6502e15e8f27d51ccca
-
SHA256
63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee
-
SHA512
2a9074b7ff70cbc922b89f39aeff5d9a0c5d1a21fa25b7eeedae07683b9359c3b3a2c1f2fa5bdb77860d26340690f11b52d8b0cc55d7bdae624a70e86d13defd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-