General
-
Target
Setup.exe
-
Size
5.0MB
-
Sample
230421-tze2lsaf9x
-
MD5
36ec5db7a7da85a85416870098529108
-
SHA1
5f2052d19badb1a953fb53aae197d7126106beb6
-
SHA256
b86b793d720b43d3fb1525f98758256d1ccf4ed543dc1bd01b54921f7143fb46
-
SHA512
00e544be80e53281a6e66c473a8d8c436003fe76f1b464515ba5f50b523c40acc302ba3d348d1cbbd2970611127fd336e84de9a3f55ab85e46ceb512ed5c7b9b
-
SSDEEP
49152:SZWMqic3obV0//WmD1ufCiORefaMG2wyFK7O3c194MXxdhtF4My9KMlenxepLMz:JMNRb6HdjSZZFKy7MhPOg
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
TEST 21.04.2023
88.218.171.68:20005
-
auth_value
a6b4c490205db18f22abb83df6a972f1
Targets
-
-
Target
Setup.exe
-
Size
5.0MB
-
MD5
36ec5db7a7da85a85416870098529108
-
SHA1
5f2052d19badb1a953fb53aae197d7126106beb6
-
SHA256
b86b793d720b43d3fb1525f98758256d1ccf4ed543dc1bd01b54921f7143fb46
-
SHA512
00e544be80e53281a6e66c473a8d8c436003fe76f1b464515ba5f50b523c40acc302ba3d348d1cbbd2970611127fd336e84de9a3f55ab85e46ceb512ed5c7b9b
-
SSDEEP
49152:SZWMqic3obV0//WmD1ufCiORefaMG2wyFK7O3c194MXxdhtF4My9KMlenxepLMz:JMNRb6HdjSZZFKy7MhPOg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-