General
-
Target
45cd85d238a6fd6b0f760c2c418f729a47084304da890dbe2f85fdb7cc4f49ff
-
Size
288KB
-
Sample
221230-xa6ptagc34
-
MD5
812993196ef9efb332aa31f6c5278479
-
SHA1
c48c8affceb580314a60957f4d119457122d7bcc
-
SHA256
45cd85d238a6fd6b0f760c2c418f729a47084304da890dbe2f85fdb7cc4f49ff
-
SHA512
a5349a98193df840ecc106b0e78c90d66246dc914587e8a40754c2a32cfb4a1e922da5180711e8ea75881af9fedd196d589d95f368d6460326990eae68e17f39
-
SSDEEP
6144:Y5biLlyhXDWxbxMhqugbeco5oFUxx3E5:YQUhXDWlmfj
Static task
static1
Behavioral task
behavioral1
Sample
45cd85d238a6fd6b0f760c2c418f729a47084304da890dbe2f85fdb7cc4f49ff.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
Redline Bot
193.42.244.249:5514
-
auth_value
dba2cba3a65b70477f54eb1d91e5f886
Extracted
redline
pub2
89.22.231.25:45245
-
auth_value
ea9464d486a641bb513057e5f63399e1
Targets
-
-
Target
45cd85d238a6fd6b0f760c2c418f729a47084304da890dbe2f85fdb7cc4f49ff
-
Size
288KB
-
MD5
812993196ef9efb332aa31f6c5278479
-
SHA1
c48c8affceb580314a60957f4d119457122d7bcc
-
SHA256
45cd85d238a6fd6b0f760c2c418f729a47084304da890dbe2f85fdb7cc4f49ff
-
SHA512
a5349a98193df840ecc106b0e78c90d66246dc914587e8a40754c2a32cfb4a1e922da5180711e8ea75881af9fedd196d589d95f368d6460326990eae68e17f39
-
SSDEEP
6144:Y5biLlyhXDWxbxMhqugbeco5oFUxx3E5:YQUhXDWlmfj
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-