General
-
Target
Driver Booster PRO.zip
-
Size
2.5MB
-
Sample
221005-1ejbvsgaaj
-
MD5
cbfbbb9d4b5f0e396fb1731b22252a91
-
SHA1
9f238344e8303435bf411a274e957de0833f7fb1
-
SHA256
f694cfada7521c55767270213ce1b6c6f3bf434a376b172d5eeb5d732a1a960a
-
SHA512
0d34342dfcb5d26c99dd55cc44484e4f321d29530af09c237e46e8bceb47b050cf2bc06daba2c2b8400eaa5847e8e0a9c4172e32153d8589cb3eac7ec2337ac8
-
SSDEEP
49152:VTEw+CY6mxQntatsFiqpeY/92Jh/0ZMgoK+Yw9TBmrCgWqbFCrh3d:REwvYGYtsF3fkJdKUt4njFCtN
Static task
static1
Behavioral task
behavioral1
Sample
Installer/installer.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Installer/installer.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
test
89.22.238.112:16108
-
auth_value
53d3260e19811ed645d4695958f97695
Targets
-
-
Target
Installer/installer.exe
-
Size
573.1MB
-
MD5
836d5c8980966392f6ef7cfa091b95c7
-
SHA1
aa9e473c4a798a1bec3d8393b0bc91896e1075b4
-
SHA256
53864ad6097d98c2a38b03a079f143b45e6ce1bd13ad09cb60c8852bd96882c9
-
SHA512
fa3f348d96634656a92edb981331cb4666907993cd94932cf891d9bb10d59f7c885b5b122ca7f18e154213026d9229432873e41983214342486097c0d814e4c8
-
SSDEEP
12288:zqFDHXF32ful4Ke0pkQ/KOvS72vFBmcjf35lN/WfidDnsjPLCorsHwVGiBFF+vm9:OFr8GEwkoKOvS72yifgfdsHwR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-