General
-
Target
Installer.exe
-
Size
1.2MB
-
Sample
230615-bvntvaec81
-
MD5
d017c52a55cb3741adfb83eed1d6f052
-
SHA1
fe3e79ad0cb2b2e5374dca688c83de93ebba9bb3
-
SHA256
aa8a2e7e1556276dad50729a039ac5cc81cd16494ecb4431f8d6ad59fa8eb9ec
-
SHA512
d207b117dc24f856d7ba385d4764f724940a59d1f56a3fd2abaf267e1dbc47234bc5cfce2765ac91b501fcd0925048bb22acc1f050e2c9c36c483581c2e1598d
-
SSDEEP
12288:dGKA3PekjU4fQHp4v8Q9SWVPs+ihQq/3C:dI3gNGUQcWVPBi6q/
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
@MerchD
94.142.138.4:80
-
auth_value
9f84b46959366b2efa0773e0556f6e11
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
Installer.exe
-
Size
1.2MB
-
MD5
d017c52a55cb3741adfb83eed1d6f052
-
SHA1
fe3e79ad0cb2b2e5374dca688c83de93ebba9bb3
-
SHA256
aa8a2e7e1556276dad50729a039ac5cc81cd16494ecb4431f8d6ad59fa8eb9ec
-
SHA512
d207b117dc24f856d7ba385d4764f724940a59d1f56a3fd2abaf267e1dbc47234bc5cfce2765ac91b501fcd0925048bb22acc1f050e2c9c36c483581c2e1598d
-
SSDEEP
12288:dGKA3PekjU4fQHp4v8Q9SWVPs+ihQq/3C:dI3gNGUQcWVPBi6q/
-
Detects Lobshot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-