General
-
Target
667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af
-
Size
200KB
-
Sample
220907-l8j3xsghgn
-
MD5
8b590d5ee71b4eabf60b84681bc61b9b
-
SHA1
1f946058e7507ba35f482e2988723f9e28cd523b
-
SHA256
667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af
-
SHA512
334e5355fd8a28a9416096fe7757241cc56782e6b6a5af61fcf05b50c09f520cf7855816709bfb75570ff97fb77e7bb36bb9d544924a755dfec8b81aad74c77f
-
SSDEEP
3072:r0YPVm6ro3j8G8mzy2aGXOyTY2uxp8nGy8osNc:xPt2Vz9aFy82Wp6zsN
Static task
static1
Behavioral task
behavioral1
Sample
667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
747
78.153.144.6:2510
-
auth_value
842e51893ada92572d9bc2e846237976
Extracted
redline
nam5
103.89.90.61:34589
-
auth_value
f23be8e9063fe5d0c6fc3ee8e7d565bd
Targets
-
-
Target
667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af
-
Size
200KB
-
MD5
8b590d5ee71b4eabf60b84681bc61b9b
-
SHA1
1f946058e7507ba35f482e2988723f9e28cd523b
-
SHA256
667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af
-
SHA512
334e5355fd8a28a9416096fe7757241cc56782e6b6a5af61fcf05b50c09f520cf7855816709bfb75570ff97fb77e7bb36bb9d544924a755dfec8b81aad74c77f
-
SSDEEP
3072:r0YPVm6ro3j8G8mzy2aGXOyTY2uxp8nGy8osNc:xPt2Vz9aFy82Wp6zsN
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-