General
-
Target
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de
-
Size
5.7MB
-
Sample
220923-1dwksshhf7
-
MD5
693455604d8adcb70f7753a775d436f9
-
SHA1
833b2bd4f502ff2b65080a05426a5d9431c558b9
-
SHA256
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de
-
SHA512
519259896beb6ac0008fd0dcccfc853ddd9ae106cdc8aa8ab3f10d751dd5a62fa5c4e751f78525bba5f58d09c866ee03375ebccbc0be192642b1570ae8e50ad2
-
SSDEEP
98304:k02n7/ChNJdlFr9SQ/HZ1NJP96tcx0QEvVJiHbHxg8J5uK:o6sIXMuHbHxg8DuK
Behavioral task
behavioral1
Sample
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
3108_RUZKI
213.219.247.199:9452
-
auth_value
f71fed1cd094e4e1eb7ad1c53e542bca
Targets
-
-
Target
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de
-
Size
5.7MB
-
MD5
693455604d8adcb70f7753a775d436f9
-
SHA1
833b2bd4f502ff2b65080a05426a5d9431c558b9
-
SHA256
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de
-
SHA512
519259896beb6ac0008fd0dcccfc853ddd9ae106cdc8aa8ab3f10d751dd5a62fa5c4e751f78525bba5f58d09c866ee03375ebccbc0be192642b1570ae8e50ad2
-
SSDEEP
98304:k02n7/ChNJdlFr9SQ/HZ1NJP96tcx0QEvVJiHbHxg8J5uK:o6sIXMuHbHxg8DuK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-