General
-
Target
b613c33ea1ca7d21c3114f5013964dbb.exe
-
Size
2MB
-
Sample
230125-m7d1ysfg82
-
MD5
b613c33ea1ca7d21c3114f5013964dbb
-
SHA1
c54011895b450afdd90216f845afb28fd86dbb7a
-
SHA256
dcf4a9e709b5f1dd912e2455dfeb7267548c5f0597b92d2fd67b8d7cba097377
-
SHA512
b35364305b98ddb89f6f78ef438369409a853944bf0bdb8594a58d03fc7336b2e68e77e2cdd4d14d8fba94810fb2653b230987d8aff7d84ebd7fba8aabb631fa
-
SSDEEP
24576:KTXEPcN5JzQAMsJKStXO7sLeNVrMrtxZC1c6sDkFWE+QQdOvV/J0lDAdsBlwOxXD:gVVO7keNWuahOORJ/
Static task
static1
Behavioral task
behavioral1
Sample
b613c33ea1ca7d21c3114f5013964dbb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b613c33ea1ca7d21c3114f5013964dbb.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
95.217.146.176:4283
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Targets
-
-
Target
b613c33ea1ca7d21c3114f5013964dbb.exe
-
Size
2MB
-
MD5
b613c33ea1ca7d21c3114f5013964dbb
-
SHA1
c54011895b450afdd90216f845afb28fd86dbb7a
-
SHA256
dcf4a9e709b5f1dd912e2455dfeb7267548c5f0597b92d2fd67b8d7cba097377
-
SHA512
b35364305b98ddb89f6f78ef438369409a853944bf0bdb8594a58d03fc7336b2e68e77e2cdd4d14d8fba94810fb2653b230987d8aff7d84ebd7fba8aabb631fa
-
SSDEEP
24576:KTXEPcN5JzQAMsJKStXO7sLeNVrMrtxZC1c6sDkFWE+QQdOvV/J0lDAdsBlwOxXD:gVVO7keNWuahOORJ/
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation