General
-
Target
NEAS.2211a370844148eeb489ad79ca40636abin_JC.zip
-
Size
309KB
-
Sample
231006-p54vpsbf5x
-
MD5
29ad19a5364b7a091181bb7f7089b024
-
SHA1
3bf136d021afdbfecfc2df37c4114198ba0eb8c9
-
SHA256
200f2a3dd32cc7f7c39bac79d6cab48bf040fb4900254db5dcb65e8796b09246
-
SHA512
4b1ed0375dcdb3594c840b4a3b53b7c1a7ff23d78c7d81050548ff84ca29026ca8e8a7bdf0f165e345c732b8e6a542f455deab298cbec805dd347d375e9fa2ce
-
SSDEEP
6144:eAkUyuj+Zux3pk+sgkN7/+Vam3JKvugtou06lpxhvLOooDUd:CUBj+uCJp7QFgtou9lBL7oY
Static task
static1
Behavioral task
behavioral1
Sample
ba9dcc325c94223a3a6b86a32e1b45a23cf61af6b360a678008c2f0e2a69a5c1.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
andi
155.94.136.249:45715
Targets
-
-
Target
ba9dcc325c94223a3a6b86a32e1b45a23cf61af6b360a678008c2f0e2a69a5c1.exe
-
Size
405KB
-
MD5
2211a370844148eeb489ad79ca40636a
-
SHA1
bd25bc951d7c609bdd40ddfdb13533fe5facb4fd
-
SHA256
ba9dcc325c94223a3a6b86a32e1b45a23cf61af6b360a678008c2f0e2a69a5c1
-
SHA512
64f22905c739ea14b7bcdd0575caa7794e0f151223099f5680016680c2f99f83805a19cf128618a9077b35d3a95f3a2b013077fe91324e77b3d6e8fa99bfd9db
-
SSDEEP
6144:65EuZhFKEW5iVlV1Q8jWA2pdpcX4hGRQhE9EsU5TqhMcOUdFfEsuABNueCgq:6pZhFSinvQ8jWA2psoh4+bssTTSuAJq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-