General
-
Target
cb66f6c4f4c980acc9c6f4d62a1effaba3dd97d0cd7ff1574f39768f92e46f3f
-
Size
301KB
-
Sample
220916-went5agch7
-
MD5
9acd84142c3c8f65fd60b6ff81c6f7f8
-
SHA1
b2b7f9462d10537542582fcbef19f8eee468952a
-
SHA256
cb66f6c4f4c980acc9c6f4d62a1effaba3dd97d0cd7ff1574f39768f92e46f3f
-
SHA512
793c2874464bb2ea1e7b168ffe34d57dd4cf861dc4116f121a04c0e980a006e3d724d5575bb249ecb9b0ee2ef6067675e14a593775e5e04e46c12a2bc9a5f849
-
SSDEEP
6144:SmFSmmtANMYHqGgvoy609yc2GnigabwVf:SESfSNMYHqGQlEc2Gi
Static task
static1
Behavioral task
behavioral1
Sample
cb66f6c4f4c980acc9c6f4d62a1effaba3dd97d0cd7ff1574f39768f92e46f3f.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
dark1
192.210.216.238:48547
-
auth_value
a3d0382be5313e134a596886d58415a7
Targets
-
-
Target
cb66f6c4f4c980acc9c6f4d62a1effaba3dd97d0cd7ff1574f39768f92e46f3f
-
Size
301KB
-
MD5
9acd84142c3c8f65fd60b6ff81c6f7f8
-
SHA1
b2b7f9462d10537542582fcbef19f8eee468952a
-
SHA256
cb66f6c4f4c980acc9c6f4d62a1effaba3dd97d0cd7ff1574f39768f92e46f3f
-
SHA512
793c2874464bb2ea1e7b168ffe34d57dd4cf861dc4116f121a04c0e980a006e3d724d5575bb249ecb9b0ee2ef6067675e14a593775e5e04e46c12a2bc9a5f849
-
SSDEEP
6144:SmFSmmtANMYHqGgvoy609yc2GnigabwVf:SESfSNMYHqGQlEc2Gi
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-