General
-
Target
362592241e15293c68d0f24468723bbb.exe
-
Size
206KB
-
Sample
220220-x5hapscgdm
-
MD5
362592241e15293c68d0f24468723bbb
-
SHA1
99b0b0506c746fbf7dd23c684dcc1d81a6f78e98
-
SHA256
43f2b1760660ae09452c80f028390add8d8b2d95920d608e45c191f883167682
-
SHA512
3e01c2c034a1398bdfd77459598746020af60c7adadf2c76039c4b727755abd6dd15b3a97df3214ce6e5ad0cbb08398b11a173ce87da9ab563754d3acc4aa56e
Static task
static1
Behavioral task
behavioral1
Sample
362592241e15293c68d0f24468723bbb.exe
Resource
win7-en-20211208
Malware Config
Extracted
redline
paps
65.108.27.131:45256
-
auth_value
c7b06cfdce3af6496f70c3f411db6722
Targets
-
-
Target
362592241e15293c68d0f24468723bbb.exe
-
Size
206KB
-
MD5
362592241e15293c68d0f24468723bbb
-
SHA1
99b0b0506c746fbf7dd23c684dcc1d81a6f78e98
-
SHA256
43f2b1760660ae09452c80f028390add8d8b2d95920d608e45c191f883167682
-
SHA512
3e01c2c034a1398bdfd77459598746020af60c7adadf2c76039c4b727755abd6dd15b3a97df3214ce6e5ad0cbb08398b11a173ce87da9ab563754d3acc4aa56e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-