General
-
Target
c854b3c9703a9edbbc5ad1ad2bca56f9.exe
-
Size
129KB
-
Sample
220927-e38qrscdh8
-
MD5
c854b3c9703a9edbbc5ad1ad2bca56f9
-
SHA1
c04173761a3765b397031fd697feba36e884c433
-
SHA256
bf53766eb860140c6914ffb3bb1fa152e709e19b04b932e16dd26c16a8008c17
-
SHA512
3ddeec9741f366ce5c9e37b590987f609590c62ba6b7f32dcff4aa569eeb8438f25c5fc8ea48540d668f412ced042f00c509192ff7179c3fbb7c36f82d4b2bd2
-
SSDEEP
3072:lT+LuZT55rms2XBbrdE623LIfVDBLbaaaaaaaCkXQ5B:K3NJbeLIfPLbaaaaaaa3X
Static task
static1
Behavioral task
behavioral1
Sample
c854b3c9703a9edbbc5ad1ad2bca56f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c854b3c9703a9edbbc5ad1ad2bca56f9.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
11
77.73.134.27:7161
-
auth_value
e6aadafed1fda7723d7655a5894828d2
Extracted
redline
install
212.8.244.233:43690
-
auth_value
cbce7277fef2185d93b8332df3940ad5
Targets
-
-
Target
c854b3c9703a9edbbc5ad1ad2bca56f9.exe
-
Size
129KB
-
MD5
c854b3c9703a9edbbc5ad1ad2bca56f9
-
SHA1
c04173761a3765b397031fd697feba36e884c433
-
SHA256
bf53766eb860140c6914ffb3bb1fa152e709e19b04b932e16dd26c16a8008c17
-
SHA512
3ddeec9741f366ce5c9e37b590987f609590c62ba6b7f32dcff4aa569eeb8438f25c5fc8ea48540d668f412ced042f00c509192ff7179c3fbb7c36f82d4b2bd2
-
SSDEEP
3072:lT+LuZT55rms2XBbrdE623LIfVDBLbaaaaaaaCkXQ5B:K3NJbeLIfPLbaaaaaaa3X
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation