General
-
Target
file.exe
-
Size
3.1MB
-
Sample
231123-r21d8abb6x
-
MD5
78ea627f1dddce169de7dbd97a1d10e8
-
SHA1
98cfb4c165ed6385d671374cfcfc0a9985621a2c
-
SHA256
5c1beeacd2b06dfb2f3e42494583c6fb0ab197496058d9785e5cf937a965c82d
-
SHA512
4241e82db0572a4e87ba32d564d6b453dbee564d1ac2848cdabb93bb75fbc41cb765188fda9fa9710a12da8988a77fa6fb29ae26c39ef2db1f314605b0e177a1
-
SSDEEP
98304:l8XKKeJ7sTm7p/hTxS4A3ujj+BU7UYQgjZoEBgBfjUdXr:ged/hlSOjjCUArYoEALUpr
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Malware Config
Extracted
redline
1MIL
185.173.38.57:80
Targets
-
-
Target
file.exe
-
Size
3.1MB
-
MD5
78ea627f1dddce169de7dbd97a1d10e8
-
SHA1
98cfb4c165ed6385d671374cfcfc0a9985621a2c
-
SHA256
5c1beeacd2b06dfb2f3e42494583c6fb0ab197496058d9785e5cf937a965c82d
-
SHA512
4241e82db0572a4e87ba32d564d6b453dbee564d1ac2848cdabb93bb75fbc41cb765188fda9fa9710a12da8988a77fa6fb29ae26c39ef2db1f314605b0e177a1
-
SSDEEP
98304:l8XKKeJ7sTm7p/hTxS4A3ujj+BU7UYQgjZoEBgBfjUdXr:ged/hlSOjjCUArYoEALUpr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-