General
-
Target
02e3ce5f9cff3521b4e443a7a98955ab.bin.exe
-
Size
1.2MB
-
Sample
230620-qyhvbscd33
-
MD5
02e3ce5f9cff3521b4e443a7a98955ab
-
SHA1
d022344ccf678b0d70f29770e54f836fb20eb737
-
SHA256
1551371a8c26e90e3ce229fd4f68351373e6bafcd7cfbe51e4892605bda772d0
-
SHA512
1ee18cda37cab9a25117fc609a6ecc088d89c40267679bb5e3b383e663e174996ab7c57a7a8d2d7ba92f33c40bcfd960ca94243902946fc9377a0780a0fa422d
-
SSDEEP
6144:SBsloyGJpqpn9PZZiQ3/0tAOVfuuJR+BnuonkENk6C8ZmMxonUMFO/NogCP2:S6XGJpqdNctbfpInuokWk6leQ2P2
Static task
static1
Behavioral task
behavioral1
Sample
02e3ce5f9cff3521b4e443a7a98955ab.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02e3ce5f9cff3521b4e443a7a98955ab.bin.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
@sogood1337
94.142.138.4:80
-
auth_value
55bcb57dbab66d380a24118a44c40da2
Extracted
laplas
http://185.209.161.189
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
02e3ce5f9cff3521b4e443a7a98955ab.bin.exe
-
Size
1.2MB
-
MD5
02e3ce5f9cff3521b4e443a7a98955ab
-
SHA1
d022344ccf678b0d70f29770e54f836fb20eb737
-
SHA256
1551371a8c26e90e3ce229fd4f68351373e6bafcd7cfbe51e4892605bda772d0
-
SHA512
1ee18cda37cab9a25117fc609a6ecc088d89c40267679bb5e3b383e663e174996ab7c57a7a8d2d7ba92f33c40bcfd960ca94243902946fc9377a0780a0fa422d
-
SSDEEP
6144:SBsloyGJpqpn9PZZiQ3/0tAOVfuuJR+BnuonkENk6C8ZmMxonUMFO/NogCP2:S6XGJpqdNctbfpInuokWk6leQ2P2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-