General
-
Target
Crypto.rar
-
Size
216KB
-
Sample
221106-baklpaadg7
-
MD5
64721492da2d3e25d649dee590a16688
-
SHA1
e3d6b49b2d6dcfe16b6de0c9eca0aeb294b15037
-
SHA256
7c96038502d761cbeac106b812380d407940afe16a2677df7fad33d6ee142c18
-
SHA512
5c789cdd26ccb09cf4e516f4d5203946c380577db2a0412c924cf265e05f449d2795508835f2a1c3a1535443f802974f48f03ead2a4b8136bf0f2223f37fb617
-
SSDEEP
6144:LyDz+NgucGQGM5g5EE+GOcmt7qog+caUhsG6uHZ:eDz+CulMmScmt7qoJUt
Static task
static1
Behavioral task
behavioral1
Sample
Crypto2022.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
ubivca
185.106.92.228:24221
-
auth_value
43ba5caf87c83f17aa82312a2b9ec2de
Targets
-
-
Target
Crypto2022.exe
-
Size
350KB
-
MD5
35a8a62ef9d13c5c9b4d394116773609
-
SHA1
78625028c550a8d9d1c7c7aef52ae98c9728f70b
-
SHA256
a0ac355c321bb962cd3d0825f3caabfd4e6c9fd847d15ca72ce4bffbcf617c23
-
SHA512
0682e346ddbf6dc27a65db3e1a33c392c4736ab2552d6fcab6d3ee43856dcbe4a75f79977ba7abda23b0a317452f7b72755b4c6e15ea5e242e2b8e01ae16f2ed
-
SSDEEP
6144:3c1o7hv9QAMuezq0BHH0DBYXmgwC1AOUw5HvxahMo0/63IG3clQem9K23TkRZYVl:3c1od9QAMuezq7FzyaSvcMofXMY9KOIu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-