General
-
Target
da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd
-
Size
2.4MB
-
Sample
221101-nk3lgabde4
-
MD5
31fc2ff39a3c49638f6f650c509deb3f
-
SHA1
87657e08826225f2c7adbaf9bc2a0a9fc5fd7ccd
-
SHA256
da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd
-
SHA512
3294f6f13f2990ca3a1479914aba0ae1da9b3dfe354e37d30809023d66cf0a8f5558556b568c0a7e77fdae5576d35ec638ca7e8bcc7c3acd929db4e49b868dc1
-
SSDEEP
24576:DM3mEyYcY+lpbgwMAPlKUhqLmNugOhYNyO8BLBk5LkSrWDGIHNe+el3RuQ55313u:MmnkmUO8BLBk5V3l3Q
Static task
static1
Behavioral task
behavioral1
Sample
da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
024d191501563555109913dcf3ada91c
Targets
-
-
Target
da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd
-
Size
2.4MB
-
MD5
31fc2ff39a3c49638f6f650c509deb3f
-
SHA1
87657e08826225f2c7adbaf9bc2a0a9fc5fd7ccd
-
SHA256
da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd
-
SHA512
3294f6f13f2990ca3a1479914aba0ae1da9b3dfe354e37d30809023d66cf0a8f5558556b568c0a7e77fdae5576d35ec638ca7e8bcc7c3acd929db4e49b868dc1
-
SSDEEP
24576:DM3mEyYcY+lpbgwMAPlKUhqLmNugOhYNyO8BLBk5LkSrWDGIHNe+el3RuQ55313u:MmnkmUO8BLBk5V3l3Q
-
Modifies security service
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Stops running service(s)
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-