General
-
Target
905fcb65077aa07005af8f7f7cbc3392205c56576f0b30ba407f78f72edaba2a
-
Size
218KB
-
Sample
220628-px7avshdhp
-
MD5
387af1d8f0c82fa1111931c2cad2f912
-
SHA1
7dc4b93f1c6031512ea2f232741740292f0d3232
-
SHA256
905fcb65077aa07005af8f7f7cbc3392205c56576f0b30ba407f78f72edaba2a
-
SHA512
d72c4a04ff54c3d9c22e0c22eb843f420ee7ba423ebc9ed77e72bf6477fbbcbfc756c2e8003bcae63e2ef63330dc878f482cf300877841484be8d31437696d31
Static task
static1
Behavioral task
behavioral1
Sample
905fcb65077aa07005af8f7f7cbc3392205c56576f0b30ba407f78f72edaba2a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
redline
mario2
193.106.191.129:80
-
auth_value
4ef7e3fec3a418b2f0233b604d0560d9
Targets
-
-
Target
905fcb65077aa07005af8f7f7cbc3392205c56576f0b30ba407f78f72edaba2a
-
Size
218KB
-
MD5
387af1d8f0c82fa1111931c2cad2f912
-
SHA1
7dc4b93f1c6031512ea2f232741740292f0d3232
-
SHA256
905fcb65077aa07005af8f7f7cbc3392205c56576f0b30ba407f78f72edaba2a
-
SHA512
d72c4a04ff54c3d9c22e0c22eb843f420ee7ba423ebc9ed77e72bf6477fbbcbfc756c2e8003bcae63e2ef63330dc878f482cf300877841484be8d31437696d31
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-