General
-
Target
03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b
-
Size
177KB
-
Sample
221127-16newscg29
-
MD5
117b064fb02e75f65ab71315e46e5618
-
SHA1
8bdc3f169d4d97401c300ff30fbc4c124e709af6
-
SHA256
03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b
-
SHA512
9f480e798f24b69a385001f298196ddd7a00fbbc5887c6c862e8c28776df29c509035c0cf237fe7c5fd831c73f4648040db15c0817ff4864481cba4afe414993
-
SSDEEP
3072:sr85CTK/Pi74wINPcWF1HERPhhESSUlGYO/ZMTFZl+KIGTqe:k9u/TEmEphhwYMZMBZlhI/e
Behavioral task
behavioral1
Sample
03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
1.0
149.28.133.54:4921
-
auth_value
84aa9e53350b3b2df39f0f1f4f6465a1
Targets
-
-
Target
03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b
-
Size
177KB
-
MD5
117b064fb02e75f65ab71315e46e5618
-
SHA1
8bdc3f169d4d97401c300ff30fbc4c124e709af6
-
SHA256
03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b
-
SHA512
9f480e798f24b69a385001f298196ddd7a00fbbc5887c6c862e8c28776df29c509035c0cf237fe7c5fd831c73f4648040db15c0817ff4864481cba4afe414993
-
SSDEEP
3072:sr85CTK/Pi74wINPcWF1HERPhhESSUlGYO/ZMTFZl+KIGTqe:k9u/TEmEphhwYMZMBZlhI/e
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-