General
-
Target
https://drive.google.com/file/d/17oDc8BG7ks1itmLf1QHVmCNDvkdbLxTS/view?usp=sharing
-
Sample
230426-zjvp1sbg59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/17oDc8BG7ks1itmLf1QHVmCNDvkdbLxTS/view?usp=sharing
Resource
win10v2004-20230220-en
28 signatures
1800 seconds
Malware Config
Extracted
Family
redline
C2
45.15.157.147:37535
Attributes
-
auth_value
faa726e413b55939e6d3f367a5df8b7e
Targets
-
-
Target
https://drive.google.com/file/d/17oDc8BG7ks1itmLf1QHVmCNDvkdbLxTS/view?usp=sharing
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Sets file execution options in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-