General
-
Target
Set-up32Х64bit.exe
-
Size
906.0MB
-
Sample
230616-3p2mashc77
-
MD5
4e3fcd320f3c09ce853af113918939d5
-
SHA1
de2cb6ccbf2d91b5ffdd1091bab5ec20bb90aa2b
-
SHA256
18e658ec363968bf44dd6fcc8fb015a34441c346b8c196d0ae320173d48b98d0
-
SHA512
2f1cd98e4b822acacde9499b89cb0ca194eaee3deb8e1a8c1028d70811356c5ded156966b50c4aeb2489b88c2f88469fdb26a52e6f1920f8cdd38b8abc190ae7
-
SSDEEP
98304:x0A+OS/5mKctYIWOcNZE5JJKqEDkwhrrm5jMtunv:x0A05zH
Static task
static1
Behavioral task
behavioral1
Sample
Set-up32Х64bit.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Set-up32Х64bit.exe
Resource
win10v2004-20230220-es
Malware Config
Extracted
redline
@aboba255
94.142.138.4:80
-
auth_value
6487f4e00b6ec53f5fc436622f366458
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
Set-up32Х64bit.exe
-
Size
906.0MB
-
MD5
4e3fcd320f3c09ce853af113918939d5
-
SHA1
de2cb6ccbf2d91b5ffdd1091bab5ec20bb90aa2b
-
SHA256
18e658ec363968bf44dd6fcc8fb015a34441c346b8c196d0ae320173d48b98d0
-
SHA512
2f1cd98e4b822acacde9499b89cb0ca194eaee3deb8e1a8c1028d70811356c5ded156966b50c4aeb2489b88c2f88469fdb26a52e6f1920f8cdd38b8abc190ae7
-
SSDEEP
98304:x0A+OS/5mKctYIWOcNZE5JJKqEDkwhrrm5jMtunv:x0A05zH
-
Detects Lobshot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-