General
-
Target
FiIе (2).rar
-
Size
3.7MB
-
Sample
230304-j3vlcsdd45
-
MD5
8a5e102aaa6846d3c79d40e92e120e19
-
SHA1
d34ec15250b2a792cc92ba601e05fee36d13eb84
-
SHA256
b3b9d9d19f58fb77f37b0184eea0e90f53a5b947fe335f2548e2d10d1d809d68
-
SHA512
c368e3a62def5d1412116846986996e9f3b2c31bf87aba3bc31a6d601675118318b8794696349bd37fa45c52febce9af70e2e736db6cd6959c109433292ed652
-
SSDEEP
98304:5W4EiVUuH4SC6V0E/y2z10/H8F7rOo6CPEA6o4pXSyI4qXo:5YA3CA0Ea2x0/cdCy6xpCv4Uo
Static task
static1
Behavioral task
behavioral1
Sample
Setup 2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup 2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
FiIе/Setup.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
45.138.74.121:80
-
auth_value
b108e6c8200f19bf525e2e611b2e98b6
Targets
-
-
Target
Setup 2.exe
-
Size
3.4MB
-
MD5
fb430617074d580d39d5713abcfdc095
-
SHA1
08d5d42d079a1b60c39225cb2933686d050edc1d
-
SHA256
f4326903b6446139efb0ee5e3251ca95f1ada0963829deb1547df4c5b6930bf2
-
SHA512
6df1dd5f8c42529e99fc93c93c4deb491d8f811819cdbed4c222da28254d35fe02f0792db2e6b59ff00538351d51f687e8a54f06f7a643bf973177c6aedd1b8c
-
SSDEEP
98304:E52wmQdKG7qhlBQekY049suZMx8WDj09hKBNUhlbYY:Ep37wdkdXuZMCSKcByhll
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
-
-
Target
FiIе/Setup.exe
-
Size
480KB
-
MD5
701477f861bde9756d5fc3ace9d2f019
-
SHA1
2e0f06df176b574cd8f629f8e0d32fdedc72dd20
-
SHA256
48aa1381548b2590a3ae1d740852fdefdf51c46666ee2d86e50aeae66afbda60
-
SHA512
97eb40e656f06fc06b0c7d52aae69c64464ee47a8d350e041fe6c7c90e35ed44b1d976bdbcb968c146beb44624224be62fa4a2b919e81ce7644b6c13f0b636c7
-
SSDEEP
12288:cpdcHSyxPmq2i7PFMzPV2v207z4TSxf4sugsRBN3dMon:MdPypmH1VU20X4RmwMY
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-