General
-
Target
4fedb0b25dc9687a013d419cbad46c7b12da234b598d9cddc7a12631ea2e0096
-
Size
187KB
-
Sample
230103-fd541sda3y
-
MD5
d7c522092dae53650c875d30e70ddb15
-
SHA1
3baa86e61ba52b3e054b421f9c02625ea249c887
-
SHA256
4fedb0b25dc9687a013d419cbad46c7b12da234b598d9cddc7a12631ea2e0096
-
SHA512
8c0bd3ab4dafec41a2bfa61e43ca9a5778b078320eb58de7e937d13ceaa90854e7bc22455be5f6c4b90b657d9e625788e6a7faa1226c2e866948f9789d1b9399
-
SSDEEP
3072:ZFRJLmeMvbQi5zz+zxfK7cMoOZRVDYNVV9A/b3ZhyF:XLSvcS+FPWDiVV9A/bri
Static task
static1
Behavioral task
behavioral1
Sample
4fedb0b25dc9687a013d419cbad46c7b12da234b598d9cddc7a12631ea2e0096.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
@zallllis
45.15.157.136:7429
-
auth_value
819f274cbc0e7c8d89e811e4a9877964
Targets
-
-
Target
4fedb0b25dc9687a013d419cbad46c7b12da234b598d9cddc7a12631ea2e0096
-
Size
187KB
-
MD5
d7c522092dae53650c875d30e70ddb15
-
SHA1
3baa86e61ba52b3e054b421f9c02625ea249c887
-
SHA256
4fedb0b25dc9687a013d419cbad46c7b12da234b598d9cddc7a12631ea2e0096
-
SHA512
8c0bd3ab4dafec41a2bfa61e43ca9a5778b078320eb58de7e937d13ceaa90854e7bc22455be5f6c4b90b657d9e625788e6a7faa1226c2e866948f9789d1b9399
-
SSDEEP
3072:ZFRJLmeMvbQi5zz+zxfK7cMoOZRVDYNVV9A/b3ZhyF:XLSvcS+FPWDiVV9A/bri
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-