General
-
Target
4cf15c857663476ccfe09612dc9a785d914c8c7abe270b87959584a63ad6cb7d
-
Size
980KB
-
Sample
211201-smfxpsdcak
-
MD5
9148ff616cc568897c299dab46a6c57d
-
SHA1
f91a4cfd04660dac905a2a22470b95a5537650bf
-
SHA256
4cf15c857663476ccfe09612dc9a785d914c8c7abe270b87959584a63ad6cb7d
-
SHA512
c7a6b2e0acf8f6c6286c880f848ca108ed9a423b16151cfb959bfa342bc1407102028e2a602176da806de69eb58471ef3448dc624e3c1ca9f3bcb51b68fd2cf1
Static task
static1
Behavioral task
behavioral1
Sample
4cf15c857663476ccfe09612dc9a785d914c8c7abe270b87959584a63ad6cb7d.exe
Resource
win10-en-20211014
Malware Config
Extracted
redline
185.215.113.57:50723
Extracted
redline
LastLovely
95.181.152.177:21142
Targets
-
-
Target
4cf15c857663476ccfe09612dc9a785d914c8c7abe270b87959584a63ad6cb7d
-
Size
980KB
-
MD5
9148ff616cc568897c299dab46a6c57d
-
SHA1
f91a4cfd04660dac905a2a22470b95a5537650bf
-
SHA256
4cf15c857663476ccfe09612dc9a785d914c8c7abe270b87959584a63ad6cb7d
-
SHA512
c7a6b2e0acf8f6c6286c880f848ca108ed9a423b16151cfb959bfa342bc1407102028e2a602176da806de69eb58471ef3448dc624e3c1ca9f3bcb51b68fd2cf1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-