General
-
Target
fb15ec7a194b19b2c9cf7118d1d1a5632e3d63d7cb8cb41c4fae2c94f60e45ef
-
Size
133KB
-
Sample
221002-neg3ksebdk
-
MD5
eb29094e7bfc752063a89718c6983134
-
SHA1
8d8395ec72d57e053f1b294721600055032385b0
-
SHA256
fb15ec7a194b19b2c9cf7118d1d1a5632e3d63d7cb8cb41c4fae2c94f60e45ef
-
SHA512
97a8d8cfa9e86d4cb67da72b1cac0e5b2d12da9657862c2d329b897904621f18da09b3e7f72cb7f88b56fe728e2c7cce5217a103e4bc3f02e77d4c2005cdd4a8
-
SSDEEP
1536:9CpCzBjDAFyG24jRyZPhXvlggN2wGpdldOGGHsCSeKbY1mVp28RzCYk/JioznyZl:98gDgjRkPZlgaWpXUuImHpuYk/Mo7Ul
Static task
static1
Behavioral task
behavioral1
Sample
fb15ec7a194b19b2c9cf7118d1d1a5632e3d63d7cb8cb41c4fae2c94f60e45ef.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
inslab26
185.182.194.25:8251
-
auth_value
7c9cbd0e489a3c7fd31006406cb96f5b
Targets
-
-
Target
fb15ec7a194b19b2c9cf7118d1d1a5632e3d63d7cb8cb41c4fae2c94f60e45ef
-
Size
133KB
-
MD5
eb29094e7bfc752063a89718c6983134
-
SHA1
8d8395ec72d57e053f1b294721600055032385b0
-
SHA256
fb15ec7a194b19b2c9cf7118d1d1a5632e3d63d7cb8cb41c4fae2c94f60e45ef
-
SHA512
97a8d8cfa9e86d4cb67da72b1cac0e5b2d12da9657862c2d329b897904621f18da09b3e7f72cb7f88b56fe728e2c7cce5217a103e4bc3f02e77d4c2005cdd4a8
-
SSDEEP
1536:9CpCzBjDAFyG24jRyZPhXvlggN2wGpdldOGGHsCSeKbY1mVp28RzCYk/JioznyZl:98gDgjRkPZlgaWpXUuImHpuYk/Mo7Ul
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-