General
-
Target
BLTools.1.9.zip
-
Size
3.3MB
-
Sample
221230-nbtxzafe46
-
MD5
197b40946152f7f788009dab2af4702a
-
SHA1
51513f4e3795567221c4bfb658d3c32345b33d56
-
SHA256
e0ab9594571ed1a380313fc0d580cf7a9462270b8891e581285f68b5fd1d58b8
-
SHA512
d95adfa85119d76fa94629a1bd3a82b092728c12dd97cb1343f6efebf018728bdfce431820e449805214e9d453a8896711e752a84956207e5ff9c3d77e13665d
-
SSDEEP
98304:ojir/gkRR2K4q+PVcWalKO3/yYWY4hPqcXV/LO:ou/5Rp1WalHPz0hPqcly
Static task
static1
Behavioral task
behavioral1
Sample
BLTools.1.9.zip
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
AlphaFS.dll
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
BLTools 1.9.exe
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
Extreme.Net.dll
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
Ookii.Dialogs.Wpf.dll
Resource
win10-20220901-en
Behavioral task
behavioral6
Sample
Settings.ini
Resource
win10-20220812-en
Malware Config
Extracted
redline
@dwqmosh
neredenkyor.xyz:81
-
auth_value
a94b13695bd4053b8b47b0976366da25
Targets
-
-
Target
BLTools.1.9.zip
-
Size
3.3MB
-
MD5
197b40946152f7f788009dab2af4702a
-
SHA1
51513f4e3795567221c4bfb658d3c32345b33d56
-
SHA256
e0ab9594571ed1a380313fc0d580cf7a9462270b8891e581285f68b5fd1d58b8
-
SHA512
d95adfa85119d76fa94629a1bd3a82b092728c12dd97cb1343f6efebf018728bdfce431820e449805214e9d453a8896711e752a84956207e5ff9c3d77e13665d
-
SSDEEP
98304:ojir/gkRR2K4q+PVcWalKO3/yYWY4hPqcXV/LO:ou/5Rp1WalHPz0hPqcly
Score1/10 -
-
-
Target
AlphaFS.dll
-
Size
359KB
-
MD5
f2f6f6798d306d6d7df4267434b5c5f9
-
SHA1
23be62c4f33fc89563defa20e43453b7cdfc9d28
-
SHA256
837f2ceab6bbd9bc4bf076f1cb90b3158191888c3055dd2b78a1e23f1c3aafdd
-
SHA512
1f0c52e1d6e27382599c91ebd5e58df387c6f759d755533e36688b402417101c0eb1d6812e523d23048e0d03548fd0985a3fd7f96c66625c6299b1537c872211
-
SSDEEP
6144:QDyJst+jyCnzLp9hvHsPvPvPvS2JQvlojidPp:QDyJsvCnzZf4U1d
Score1/10 -
-
-
Target
BLTools 1.9.exe
-
Size
3.2MB
-
MD5
aa3439f189b7a3f890affe373044fe4b
-
SHA1
00cbec1c039876674224227ced4c72cbee713220
-
SHA256
1167a4871ea77b72bdcc22b290dd0f01442ec30832bdec4d1698efecaa543758
-
SHA512
22e940692487c3ba8ae8702897550ec47691e0e9df4eecef41c3f6977b7ae455dcdcdb20df1147bc37edecfd64f9cdca1697684b09785e616d0c1883774b58a4
-
SSDEEP
98304:TQ5nTr7MCu6uV3sIQTmO37cey46YvXocVH/:g7R/IQTTr74YvXocl
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
-
-
Target
Extreme.Net.dll
-
Size
121KB
-
MD5
f79f0e3a0361cac000e2d3553753cd68
-
SHA1
4314bcef76fddc9379a8f3a266b37d685d0adb79
-
SHA256
8a6518ab7419fbec3ac9875baa3afb410ad1398c7aa622a09cd9084ec6cadfcd
-
SHA512
c77516e7f5540ecd13fa5d8cecfce34629acecd9b5a445f5f48902c9e823328fa9a6694ecaa39f5b6053de61c2b850c2d87df25357548afaad6ec37eb3e5e355
-
SSDEEP
3072:bdoECIgjBibgp2tBqL0Y++ruXqMG4ih3lbpMqc:bdoECIgUrG
Score1/10 -
-
-
Target
Ookii.Dialogs.Wpf.dll
-
Size
103KB
-
MD5
932ebb3f9e7113071c6a17818342b7cc
-
SHA1
9ce2d08bc3840632092325abcc8d842eeb8189d4
-
SHA256
285aa8225732ddbcf211b1158bd6cff8bf3acbeeab69617f4be85862b7105ab5
-
SHA512
6b6086cff7b916c0c4536e3c7cba4ba17d6c4be2e4a88a5877be852e197f1f9c9c120d1295acf2b4277a9badd8cfd229ef3c1ab2049d0aeec22d3033be156141
-
SSDEEP
1536:qgoPBGuyAy52V+gtTLq6ZUc68h8O0SB/XBboIawHUPV5bKLh8sm6b0gl:qgwBGu2IV+ghd68WOxXBbx+5of
Score1/10 -
-
-
Target
Settings.ini
-
Size
2KB
-
MD5
9c2fef414b5eb3e759643cb1145a584b
-
SHA1
081999c487548a8b8fc59cf776995a0a1007699f
-
SHA256
98281d6df063d6f6f8dbccecd9e1b6a454b6f1d99dbfdc9a6e1bf9b2f026d394
-
SHA512
c54aabc7d1ef4d8b0cd2c93101fb00a294eecb0e343c8f85ad852d67f0e8582702c97898ba3422ce4a8272b69885ddde23775218380c431ff11cdb48c0eea3a3
Score1/10 -