General
-
Target
file.exe
-
Size
7.3MB
-
Sample
220902-r9ahrsffbj
-
MD5
4fade52bc24fbd95f4ce91c088f7badf
-
SHA1
a0e46aa6a7cb670dd7d7f69b0d467b432e267fed
-
SHA256
f66e317ed473eefa183bd115409da21ae3a4c0a5ba63b71d8b71d78811293d1a
-
SHA512
669cb10a04b6a8231d625fdbdb46e9f94c08a559b607336344f1030ab436966beb98b557a6090ec272694211c747b49d4ffe9dd8eb5054126c7396b0e2716ca9
-
SSDEEP
98304:eVhpkZoduG52loermUrbd5oJ8y78qRS/f5XFTwkqj6evniyHStfyywG2iP:eVXjsG52loMmcGYqRQF86evzSFwG2iP
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
3108_RUZKI
213.219.247.199:9452
-
auth_value
f71fed1cd094e4e1eb7ad1c53e542bca
Targets
-
-
Target
file.exe
-
Size
7.3MB
-
MD5
4fade52bc24fbd95f4ce91c088f7badf
-
SHA1
a0e46aa6a7cb670dd7d7f69b0d467b432e267fed
-
SHA256
f66e317ed473eefa183bd115409da21ae3a4c0a5ba63b71d8b71d78811293d1a
-
SHA512
669cb10a04b6a8231d625fdbdb46e9f94c08a559b607336344f1030ab436966beb98b557a6090ec272694211c747b49d4ffe9dd8eb5054126c7396b0e2716ca9
-
SSDEEP
98304:eVhpkZoduG52loermUrbd5oJ8y78qRS/f5XFTwkqj6evniyHStfyywG2iP:eVXjsG52loMmcGYqRQF86evzSFwG2iP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-