General
-
Target
26154e506c39c8b4681cc38a19c87249f8ce3ae6
-
Size
217KB
-
Sample
230114-qdrazaga53
-
MD5
15dec13bdd63907e5fcda9e7e621e1a2
-
SHA1
26154e506c39c8b4681cc38a19c87249f8ce3ae6
-
SHA256
569d9035ed630038599104bb8c770473e8cff91b3554a1deb4f4028b578429d3
-
SHA512
4a14c459e417d37cb841805e125c745b4bdbabd1611bbad7813b20cef639e9af99f981c16f94f7ab41765c34e6a1fa053f87a2755ce613db1d17171d72437586
-
SSDEEP
6144:AntQ758qxOopgCXDww83kI5vAOI3F5VyLchfn09c:AtQ758qxOopgzvuf0G
Static task
static1
Behavioral task
behavioral1
Sample
26154e506c39c8b4681cc38a19c87249f8ce3ae6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
26154e506c39c8b4681cc38a19c87249f8ce3ae6.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
1
107.182.129.73:21733
-
auth_value
3a5bb0917495b4312d052a0b8977d2bb
Targets
-
-
Target
26154e506c39c8b4681cc38a19c87249f8ce3ae6
-
Size
217KB
-
MD5
15dec13bdd63907e5fcda9e7e621e1a2
-
SHA1
26154e506c39c8b4681cc38a19c87249f8ce3ae6
-
SHA256
569d9035ed630038599104bb8c770473e8cff91b3554a1deb4f4028b578429d3
-
SHA512
4a14c459e417d37cb841805e125c745b4bdbabd1611bbad7813b20cef639e9af99f981c16f94f7ab41765c34e6a1fa053f87a2755ce613db1d17171d72437586
-
SSDEEP
6144:AntQ758qxOopgCXDww83kI5vAOI3F5VyLchfn09c:AtQ758qxOopgzvuf0G
Score10/10-
Modifies security service
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Stops running service(s)
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-