General
-
Target
7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4
-
Size
259KB
-
Sample
221028-ptcxvafed8
-
MD5
d3c4224a575201e32dd4a93fd847a315
-
SHA1
c60dbe76534898c09b20b36d3c8adbeb698c0c58
-
SHA256
7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4
-
SHA512
b0a624d72abbdf32cfc8fc96cc01f52a4cb21b4cce834949df3f5c8cc768c4dd323709aa06b61287c4389cf06db738636225b775dd3eb3a90d7adce8e7fdb4bb
-
SSDEEP
3072:1XOjHCbLJ1AkOwfGZmj592m3CtD4rImbceGuDis+JoqLSidkz0o7/EM/h3m:xoHsLJywuZo34DOImdngeqG4b
Static task
static1
Behavioral task
behavioral1
Sample
7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Targets
-
-
Target
7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4
-
Size
259KB
-
MD5
d3c4224a575201e32dd4a93fd847a315
-
SHA1
c60dbe76534898c09b20b36d3c8adbeb698c0c58
-
SHA256
7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4
-
SHA512
b0a624d72abbdf32cfc8fc96cc01f52a4cb21b4cce834949df3f5c8cc768c4dd323709aa06b61287c4389cf06db738636225b775dd3eb3a90d7adce8e7fdb4bb
-
SSDEEP
3072:1XOjHCbLJ1AkOwfGZmj592m3CtD4rImbceGuDis+JoqLSidkz0o7/EM/h3m:xoHsLJywuZo34DOImdngeqG4b
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-