General
-
Target
507a16cb87079ba90a8efe3a6baaa026.exe
-
Size
939KB
-
Sample
230614-e7874ach92
-
MD5
507a16cb87079ba90a8efe3a6baaa026
-
SHA1
b526a0a56488488f45d4277a9be5f3105806e0ad
-
SHA256
db78b5b857378304d5d72a826a2f1e261a71791eda971bf952cbd8182bbc62bd
-
SHA512
1193148b16891a5df52508366851c50379f05afed538882a4db5c65b345b1c1286d19de1c5f2adad09c411483fea9a6ea0038ffb624c03e42d752da27dda2b78
-
SSDEEP
6144:XmGoVjJhX8kQ/50Xi8wHi0I1GHXP3Or/c+rkGKZ:XXwX8kQBD8wHivGH/3Orc+rvKZ
Static task
static1
Behavioral task
behavioral1
Sample
507a16cb87079ba90a8efe3a6baaa026.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
507a16cb87079ba90a8efe3a6baaa026.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Targets
-
-
Target
507a16cb87079ba90a8efe3a6baaa026.exe
-
Size
939KB
-
MD5
507a16cb87079ba90a8efe3a6baaa026
-
SHA1
b526a0a56488488f45d4277a9be5f3105806e0ad
-
SHA256
db78b5b857378304d5d72a826a2f1e261a71791eda971bf952cbd8182bbc62bd
-
SHA512
1193148b16891a5df52508366851c50379f05afed538882a4db5c65b345b1c1286d19de1c5f2adad09c411483fea9a6ea0038ffb624c03e42d752da27dda2b78
-
SSDEEP
6144:XmGoVjJhX8kQ/50Xi8wHi0I1GHXP3Or/c+rkGKZ:XXwX8kQBD8wHivGH/3Orc+rvKZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-