General
-
Target
e8dffb2b7edf8c4049e00c21917860d191edcd0b2829d409b4ddf47902161742
-
Size
286KB
-
Sample
220627-ym2r3adagk
-
MD5
9ba4abda48c03ccae1c377a750e4275b
-
SHA1
e401e75fd992011f91a8c0cd4bf005b5c5c2b6ca
-
SHA256
e8dffb2b7edf8c4049e00c21917860d191edcd0b2829d409b4ddf47902161742
-
SHA512
778440b762897e0c9ba50d514fc4f448078acde559de41ddb232855da4ad2ad2b19541a8e976e6947991808282649c02114f6df0a2217abf4fa35ec0ca293423
Static task
static1
Behavioral task
behavioral1
Sample
e8dffb2b7edf8c4049e00c21917860d191edcd0b2829d409b4ddf47902161742.exe
Resource
win10-20220414-en
Malware Config
Extracted
redline
mario2
193.106.191.129:80
-
auth_value
4ef7e3fec3a418b2f0233b604d0560d9
Targets
-
-
Target
e8dffb2b7edf8c4049e00c21917860d191edcd0b2829d409b4ddf47902161742
-
Size
286KB
-
MD5
9ba4abda48c03ccae1c377a750e4275b
-
SHA1
e401e75fd992011f91a8c0cd4bf005b5c5c2b6ca
-
SHA256
e8dffb2b7edf8c4049e00c21917860d191edcd0b2829d409b4ddf47902161742
-
SHA512
778440b762897e0c9ba50d514fc4f448078acde559de41ddb232855da4ad2ad2b19541a8e976e6947991808282649c02114f6df0a2217abf4fa35ec0ca293423
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-