General
-
Target
51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11
-
Size
223KB
-
Sample
221224-yxp61sdg21
-
MD5
230e91d96c730f10db022f04a7f19110
-
SHA1
5cceb6760fc7f32612cedbbeb8d2fd4c0901c905
-
SHA256
51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11
-
SHA512
53497950915df1e90e48ff26c0ab15e683fa74b30017559db0de3a5e313ce420b1012d0a51b62495711b3e68e42276efaf8237faaff0030e0cdde6bcddc6bcc9
-
SSDEEP
3072:zDy3aLefDm5jkhafy81oGAK/DcauD3Myf/ln:maLe7tuvQjaM3l
Static task
static1
Behavioral task
behavioral1
Sample
51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
bundle2
65.21.5.58:24911
-
auth_value
d9f9d4528fe5d7d9b08b5ca49403aef0
Targets
-
-
Target
51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11
-
Size
223KB
-
MD5
230e91d96c730f10db022f04a7f19110
-
SHA1
5cceb6760fc7f32612cedbbeb8d2fd4c0901c905
-
SHA256
51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11
-
SHA512
53497950915df1e90e48ff26c0ab15e683fa74b30017559db0de3a5e313ce420b1012d0a51b62495711b3e68e42276efaf8237faaff0030e0cdde6bcddc6bcc9
-
SSDEEP
3072:zDy3aLefDm5jkhafy81oGAK/DcauD3Myf/ln:maLe7tuvQjaM3l
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-