General
-
Target
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe
-
Size
4.5MB
-
Sample
220219-nxf81aadd3
-
MD5
22b96b68b4372ff2ce604723e9436963
-
SHA1
066ff406521cc2f0aed70414ee8d4d7751d0fe2a
-
SHA256
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe
-
SHA512
0ecde5a89dd548cf16867c9a6c66c5b12f2b2e51920c1ab7cc1ff241f69a03116fe011aed2172c00cfe708c77856d5fe19d59b01a3880e3dfe38509a682d8a38
Static task
static1
Behavioral task
behavioral1
Sample
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe
Resource
win10-en-20211208
Malware Config
Extracted
redline
@Zexan
92.255.85.137:41320
-
auth_value
da8092c88adbe82a93341dec420f0fa7
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/Clipper/configure.php?cf6zrlhn=Rachel
DCbpjBAroXBj3jrvq8HRPAKd8wYPnBwwi7
rKewCaU4Q6gqJnb5nJqkDY69QoxHKXAJZi
Xiem2Rw5LULbzv6rM49FqKAKD1nHSxpjxb
TZ3Pn82NBECik8ujtc3Wu5AVsQLCdt7cG1
t1Pxn7QZPAVhrsd2cdPHDEjDR1jtwpoUvbT
GDKPOPZWADWVDB2B743X7Q5QIMXIFJTIJ3K3JTR5P2EKO22GJQRAZRKC
497qdSyfY8t9dYnAGTnk8UigUbUPL4MXTFAxobWPDZ5rReSiVNL22GEGt9ptgNbDbTe3qyj3oRq2LfEYbws8yGqnSjBWHR6
qra53qtr5kvaye7gvf5algrre5h0w6harqxluum6kp
bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l
0X9BD5F03363CA0231A32B3B36AE2CF01623E2D1FE
LcPqsR8yyzukNBgoKrq3pKEXV4rpuMeF91
ronin:09864801afc2b70c960366f4c8ad806fe9d6965d
ltc1qsdn52gjku7sts4r64fyqelqkfm789gvagglnaj
bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l
Targets
-
-
Target
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe
-
Size
4.5MB
-
MD5
22b96b68b4372ff2ce604723e9436963
-
SHA1
066ff406521cc2f0aed70414ee8d4d7751d0fe2a
-
SHA256
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe
-
SHA512
0ecde5a89dd548cf16867c9a6c66c5b12f2b2e51920c1ab7cc1ff241f69a03116fe011aed2172c00cfe708c77856d5fe19d59b01a3880e3dfe38509a682d8a38
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-