General
-
Target
3f0e8a9d61be8b596b4be752965295ad.exe
-
Size
1.1MB
-
Sample
230607-k1w7vahh8w
-
MD5
3f0e8a9d61be8b596b4be752965295ad
-
SHA1
23399af014c60bcd53af9591a6bb80bc09772139
-
SHA256
69f24003a768ac6451b4bac285475486d27c39723f474e3b8a19c61ceb732838
-
SHA512
340137d0b76a523dc680847f656048f02545a306d5fac927fd53bfe41e07ab0fea893a821e45344e2ade31d078ec6cd1cff4a6398e09321037973df703fcd8e7
-
SSDEEP
6144:Tuo1XQlPoSlw4524UcL/LHh5Z8Z0AOkGZKWklMdGwuss4tjS0G+zLT1YS:TXX4flh524UOyKKWklMdGOtjasBY
Static task
static1
Behavioral task
behavioral1
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
systembc
5.42.95.122:4308
194.87.111.29:4308
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Targets
-
-
Target
3f0e8a9d61be8b596b4be752965295ad.exe
-
Size
1.1MB
-
MD5
3f0e8a9d61be8b596b4be752965295ad
-
SHA1
23399af014c60bcd53af9591a6bb80bc09772139
-
SHA256
69f24003a768ac6451b4bac285475486d27c39723f474e3b8a19c61ceb732838
-
SHA512
340137d0b76a523dc680847f656048f02545a306d5fac927fd53bfe41e07ab0fea893a821e45344e2ade31d078ec6cd1cff4a6398e09321037973df703fcd8e7
-
SSDEEP
6144:Tuo1XQlPoSlw4524UcL/LHh5Z8Z0AOkGZKWklMdGwuss4tjS0G+zLT1YS:TXX4flh524UOyKKWklMdGOtjasBY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-