General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.23210.9609
-
Size
434KB
-
Sample
240112-2bby2sfbgj
-
MD5
49a101f27b36c7ee8a0931a656749c43
-
SHA1
13874d352aa3fbb9a262e29c03ff885714ff8429
-
SHA256
b61c3baadd541bcafad124668888e322d70720335a6f46173b489a47d5b66c1c
-
SHA512
121f6b0b8c8342df96837e173cac6814fff315385a2f1a234b77c5b59fd661930b6f67e910f797db2f7a69d00f282dd9788770925c8390dfe6abcb52ac612ad3
-
SSDEEP
6144:1T0hyKyHzHfy5joC2zBtT5GNtBFeO1gqcID8kfn5oNfNvX82a7m5BIks:ihiHzHKjo7F/Gt0wLcE5UfNMdm5
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.23210.exe
Resource
win7-20231215-en
Malware Config
Extracted
redline
Bloomberg
194.33.191.102:21751
Targets
-
-
Target
SecuriteInfo.com.Win32.PWSX-gen.23210.9609
-
Size
434KB
-
MD5
49a101f27b36c7ee8a0931a656749c43
-
SHA1
13874d352aa3fbb9a262e29c03ff885714ff8429
-
SHA256
b61c3baadd541bcafad124668888e322d70720335a6f46173b489a47d5b66c1c
-
SHA512
121f6b0b8c8342df96837e173cac6814fff315385a2f1a234b77c5b59fd661930b6f67e910f797db2f7a69d00f282dd9788770925c8390dfe6abcb52ac612ad3
-
SSDEEP
6144:1T0hyKyHzHfy5joC2zBtT5GNtBFeO1gqcID8kfn5oNfNvX82a7m5BIks:ihiHzHKjo7F/Gt0wLcE5UfNMdm5
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-