General
-
Target
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
-
Size
1.1MB
-
Sample
230707-12tfcaca78
-
MD5
03d0ae067121c5fc020a2ca5496fc8d3
-
SHA1
75cfb937b7135da6590c8db1601931039b728637
-
SHA256
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
-
SHA512
486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
SSDEEP
12288:WzDmXqzF8qEYMbZB1A37ddj0+GS4fU2tmi+q84FGfYZ4H2Z6rYfT89nT9vwMb44G:WWM+pYr0+AfNorq8xm8jrYUx9qROe1
Static task
static1
Behavioral task
behavioral1
Sample
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
070723_rc_11
amrc.tuktuk.ug:11290
-
auth_value
5c003bb2a44f6538df34879227a9ad34
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Targets
-
-
Target
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
-
Size
1.1MB
-
MD5
03d0ae067121c5fc020a2ca5496fc8d3
-
SHA1
75cfb937b7135da6590c8db1601931039b728637
-
SHA256
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
-
SHA512
486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
SSDEEP
12288:WzDmXqzF8qEYMbZB1A37ddj0+GS4fU2tmi+q84FGfYZ4H2Z6rYfT89nT9vwMb44G:WWM+pYr0+AfNorq8xm8jrYUx9qROe1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-