General
-
Target
0f825e504d181de431550ae732e1bc49.exe
-
Size
399KB
-
Sample
220810-nbrgvahedj
-
MD5
0f825e504d181de431550ae732e1bc49
-
SHA1
829eee9072fec9a8cd750add714b3fde39c4034b
-
SHA256
1c097578d9587bd8a233bd383ec71123b03c75b582dcc7e8f5c085e05d32cd3d
-
SHA512
f516b5a6987fcc36bdec18590a2cb8d563afe0bdf20ad641a72a98eb21051a7e62d698000606807dbcd335f1edf0843a0885444bb891068d360bc5ce44cd5ca3
Static task
static1
Behavioral task
behavioral1
Sample
0f825e504d181de431550ae732e1bc49.exe
Resource
win7-20220718-en
Malware Config
Extracted
redline
1
194.156.99.113:46237
-
auth_value
46329fc87924eb6eaf95dbb680b20dbd
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Targets
-
-
Target
0f825e504d181de431550ae732e1bc49.exe
-
Size
399KB
-
MD5
0f825e504d181de431550ae732e1bc49
-
SHA1
829eee9072fec9a8cd750add714b3fde39c4034b
-
SHA256
1c097578d9587bd8a233bd383ec71123b03c75b582dcc7e8f5c085e05d32cd3d
-
SHA512
f516b5a6987fcc36bdec18590a2cb8d563afe0bdf20ad641a72a98eb21051a7e62d698000606807dbcd335f1edf0843a0885444bb891068d360bc5ce44cd5ca3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-