General
-
Target
78b2113b32daf795d61b84a188f02b21ffe918f1381f2307f4dddab86b3153df
-
Size
255KB
-
Sample
221025-x716ladeg8
-
MD5
c1ab42e4fc20768f0e231ca62dad1bdc
-
SHA1
021c492adc3f75ef0e01661d6fd72ec11e246e98
-
SHA256
78b2113b32daf795d61b84a188f02b21ffe918f1381f2307f4dddab86b3153df
-
SHA512
a01ea63e2cc842ec79a10fb56e0f5ad93fad1e809fa120787b078c92eec23bea5b355fd4df68b74a90744706732515ee348964df3ccfaeeaa2b543f6df075d39
-
SSDEEP
3072:KUXVf2FsKLuSghVB5jF8jR2PkL9UWryshqNFXERCIBfotQPlmjfJ9T:J4NLinB5jFFPO95U8R0t5jDT
Static task
static1
Behavioral task
behavioral1
Sample
78b2113b32daf795d61b84a188f02b21ffe918f1381f2307f4dddab86b3153df.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
nam7
103.89.90.61:34589
-
auth_value
533c8fbdab4382453812c73ea2cee5b8
Extracted
redline
Fote
79.137.199.60:4691
-
auth_value
e063cd2fd03a8d8334b8d7c3a7b0e7ef
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Targets
-
-
Target
78b2113b32daf795d61b84a188f02b21ffe918f1381f2307f4dddab86b3153df
-
Size
255KB
-
MD5
c1ab42e4fc20768f0e231ca62dad1bdc
-
SHA1
021c492adc3f75ef0e01661d6fd72ec11e246e98
-
SHA256
78b2113b32daf795d61b84a188f02b21ffe918f1381f2307f4dddab86b3153df
-
SHA512
a01ea63e2cc842ec79a10fb56e0f5ad93fad1e809fa120787b078c92eec23bea5b355fd4df68b74a90744706732515ee348964df3ccfaeeaa2b543f6df075d39
-
SSDEEP
3072:KUXVf2FsKLuSghVB5jF8jR2PkL9UWryshqNFXERCIBfotQPlmjfJ9T:J4NLinB5jFFPO95U8R0t5jDT
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-