General
-
Target
42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13
-
Size
269KB
-
Sample
221009-244jrsabc6
-
MD5
a619f6f55a7969a2ebc80c707c45c305
-
SHA1
c916e70ef812672ff88ec246546e20915b2091e4
-
SHA256
42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13
-
SHA512
1fb1ea64864bb0f4584bce04982ecad79e09c5f0770c2387aadb33f52e88c17735fa7375c1093424855737d8d688c0e1886583a420731b99745af49299589439
-
SSDEEP
6144:qj39N0lFczkoAzO0C3UDfGc+4lWrwVfquS0:g3TCg/L3UDGchod
Static task
static1
Behavioral task
behavioral1
Sample
42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
45.15.156.37:899
-
auth_value
5b663effac3b92fe687f0181631eeff2
Extracted
raccoon
bd3a3a503834ef8e836d8a99d1ecff54
http://135.148.104.11/
Targets
-
-
Target
42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13
-
Size
269KB
-
MD5
a619f6f55a7969a2ebc80c707c45c305
-
SHA1
c916e70ef812672ff88ec246546e20915b2091e4
-
SHA256
42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13
-
SHA512
1fb1ea64864bb0f4584bce04982ecad79e09c5f0770c2387aadb33f52e88c17735fa7375c1093424855737d8d688c0e1886583a420731b99745af49299589439
-
SSDEEP
6144:qj39N0lFczkoAzO0C3UDfGc+4lWrwVfquS0:g3TCg/L3UDGchod
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-