General
-
Target
tmp
-
Size
2.0MB
-
Sample
220914-1sxreafbaq
-
MD5
e12876ee494a46dc8dad73a669bb5a8b
-
SHA1
2ee57bac039a16210fc5f705be4a6d788e0d2280
-
SHA256
4895d63af52071e09f72f2a1dd3ec093970972dd4b82b6266b67536f24f82eaf
-
SHA512
a5e472208d64443a7434d043a7995f593c61e2cac8471ef64c165c94fe957fed10a8d7a5cf926d90b5a7097e6368bbddb150f0f1619d6d46d64cb29b81d8bcb5
-
SSDEEP
49152:H8tw1hZldPSB53pNZs2vLoUE2UOsuQ0lCw9veCAGecw9N9W0f:H8tw1fldKBfNZ1zE2nDh9verN9Nw0f
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
TORRENT-SPAM
amrican-sport-live-stream.cc:4581
-
auth_value
b74f5fad3192b62b5be6e643e1fb8595
Targets
-
-
Target
tmp
-
Size
2.0MB
-
MD5
e12876ee494a46dc8dad73a669bb5a8b
-
SHA1
2ee57bac039a16210fc5f705be4a6d788e0d2280
-
SHA256
4895d63af52071e09f72f2a1dd3ec093970972dd4b82b6266b67536f24f82eaf
-
SHA512
a5e472208d64443a7434d043a7995f593c61e2cac8471ef64c165c94fe957fed10a8d7a5cf926d90b5a7097e6368bbddb150f0f1619d6d46d64cb29b81d8bcb5
-
SSDEEP
49152:H8tw1hZldPSB53pNZs2vLoUE2UOsuQ0lCw9veCAGecw9N9W0f:H8tw1fldKBfNZ1zE2nDh9verN9Nw0f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-