General
-
Target
NFT Museum launcher.zip
-
Size
971KB
-
Sample
221201-rrbm4sga84
-
MD5
0bafb291a567d94fa4ecbe2336fc4ea6
-
SHA1
38551836206d60463a2492ae4743d48778039954
-
SHA256
775b6ab14e87ed5849e038d11fe3154bbfe5915a74449aea3048e04ef0d6ccef
-
SHA512
64417bf5e357165bf4d4c0149ab50c3c6cc3098dd3b784e3fa84672be82a54c318fc8aa5d80c5858328933413506d465c3843db74387a925206a7e84667b01cf
-
SSDEEP
6144:+tuoEWwcjb1wjyqK2lIcEFwI0rkC+WLkogUM2KfpaXKG:upEvMw8WLTvM2K6
Static task
static1
Behavioral task
behavioral1
Sample
NFT Museum launcher.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
NFT Museum launcher.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
bendji$Celodon
167.235.233.35:16621
-
auth_value
fdd44841f30966a11a8cae8d553b5e88
Targets
-
-
Target
NFT Museum launcher.exe
-
Size
700.5MB
-
MD5
7527020877e19451d08a3c157d4cdd7c
-
SHA1
8e28315735c56aec7ddc5b9ef08b25262a1b7f76
-
SHA256
708b22a7b3c87320301ba5a98f0759bbf0f9728066003cb1b2bb87124e32c346
-
SHA512
2e8dfd1b5a4dd07aab891bdc0ec363ef9d9f2780f777f4c2453369e71d6397b5f33ec8eed4221241682c7a62aa31a92e015e019787482a3ccbaaaedf10adbef7
-
SSDEEP
12288:0DosEVBJgHIN4eDhgWrXVSS8Nob3LShMCO+vFH:0DEVBJgHIN4eDhgaXYNoTLSuCLvFH
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-