General
-
Target
09823fdad990d459244ee4ce3d530047259506e56904fe853efc88f7d14f45e1
-
Size
213KB
-
Sample
221015-2446asgee5
-
MD5
00328aea700ff0f10029bbb1a7daad86
-
SHA1
914dac5f4c7bde6b19652279527d1436b8b11642
-
SHA256
09823fdad990d459244ee4ce3d530047259506e56904fe853efc88f7d14f45e1
-
SHA512
a6ed2db9c943ebf5472317d6735f2a23177c84fcd1ced256b27624ac733d010d52942145da5a3a7fc999455b8c40b9c880f37eddbd4c9950623155029f091f65
-
SSDEEP
3072:qXp1aDsLYF2ag1GIV5foKsf8iTnQ9xN6JXhF80K/4e6Ey:KjLYFNITst7Q9QXhF805E
Static task
static1
Behavioral task
behavioral1
Sample
09823fdad990d459244ee4ce3d530047259506e56904fe853efc88f7d14f45e1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
535
45.15.156.26:2794
-
auth_value
e7680eed1ef96d61de0f4c54c7c5a594
Targets
-
-
Target
09823fdad990d459244ee4ce3d530047259506e56904fe853efc88f7d14f45e1
-
Size
213KB
-
MD5
00328aea700ff0f10029bbb1a7daad86
-
SHA1
914dac5f4c7bde6b19652279527d1436b8b11642
-
SHA256
09823fdad990d459244ee4ce3d530047259506e56904fe853efc88f7d14f45e1
-
SHA512
a6ed2db9c943ebf5472317d6735f2a23177c84fcd1ced256b27624ac733d010d52942145da5a3a7fc999455b8c40b9c880f37eddbd4c9950623155029f091f65
-
SSDEEP
3072:qXp1aDsLYF2ag1GIV5foKsf8iTnQ9xN6JXhF80K/4e6Ey:KjLYFNITst7Q9QXhF805E
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-