General
-
Target
file.exe
-
Size
3.1MB
-
Sample
220831-pxw5wsgad2
-
MD5
106078bb0964b75800da2013419239d9
-
SHA1
44f3c39446cebb7349697703cc88bd0c014b6c7e
-
SHA256
7e0bd7043b674f37a6c086fcd8aa5ddb0ec4ba675e4860e30f88abe3cfe4b879
-
SHA512
e9172ecbddc2d11291d6da05a65d967984c72317d525451ad13dbd6931b5b1bf580237926a4f6cd40d265f5b559efaa961352e348ce22827b3e52552ca618b7e
-
SSDEEP
98304:mHjaMebZao0p4kwkC/yRLmsH5NnyjqCgcg:mH2vaoy3wkC/yRLb5Nny
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
3108_RUZKI
213.219.247.199:9452
-
auth_value
f71fed1cd094e4e1eb7ad1c53e542bca
Targets
-
-
Target
file.exe
-
Size
3.1MB
-
MD5
106078bb0964b75800da2013419239d9
-
SHA1
44f3c39446cebb7349697703cc88bd0c014b6c7e
-
SHA256
7e0bd7043b674f37a6c086fcd8aa5ddb0ec4ba675e4860e30f88abe3cfe4b879
-
SHA512
e9172ecbddc2d11291d6da05a65d967984c72317d525451ad13dbd6931b5b1bf580237926a4f6cd40d265f5b559efaa961352e348ce22827b3e52552ca618b7e
-
SSDEEP
98304:mHjaMebZao0p4kwkC/yRLmsH5NnyjqCgcg:mH2vaoy3wkC/yRLb5Nny
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-