General
-
Target
file.exe
-
Size
2.1MB
-
Sample
221207-mkc55sgf56
-
MD5
e6c958d6186aa63eb6064737178b6951
-
SHA1
bb32ce0a30cdc7e39e8f3ef93c7420c1c9dffa7a
-
SHA256
eebeb8f37bef6e92068903c7a0dafa6a1a5f86f987ba1ad3336ccc855bfd317e
-
SHA512
c7c3d8b15452d43f7e603f1154142cfa47c6fb01b2a9fc774ecb875f7f71274b1c1a9de71e8b4a732ab5a9cc671106b9766855ebca45d05c6d4aa5ec91a35a8d
-
SSDEEP
49152:Ij1dtzZQ8TGJoCIzkVja5z/Lc/PMH9LWHL9vm8:Ij1dtz/eoCTdaBT+EdaHn
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
@andriii_ff
176.124.220.67:30929
-
auth_value
525a7ad8080b3552f2f7735af7644111
Targets
-
-
Target
file.exe
-
Size
2.1MB
-
MD5
e6c958d6186aa63eb6064737178b6951
-
SHA1
bb32ce0a30cdc7e39e8f3ef93c7420c1c9dffa7a
-
SHA256
eebeb8f37bef6e92068903c7a0dafa6a1a5f86f987ba1ad3336ccc855bfd317e
-
SHA512
c7c3d8b15452d43f7e603f1154142cfa47c6fb01b2a9fc774ecb875f7f71274b1c1a9de71e8b4a732ab5a9cc671106b9766855ebca45d05c6d4aa5ec91a35a8d
-
SSDEEP
49152:Ij1dtzZQ8TGJoCIzkVja5z/Lc/PMH9LWHL9vm8:Ij1dtz/eoCTdaBT+EdaHn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-