General
-
Target
file.exe
-
Size
95KB
-
Sample
240120-2d749shfhj
-
MD5
57935225dcb95b6ed9894d5d5e8b46a8
-
SHA1
1daf36a8db0b79be94a41d27183e4904a1340990
-
SHA256
79d7b0f170471f44ed6c07ddb4c4c9bb20c97235aef23ac052e692cb558a156d
-
SHA512
1b6362bdb7f6b177773357f5fe8e7d7ee44716fd8e63e663e446f4e204af581491d05345c12cd9cca91fd249383817da21ef2241011cdc251b7e299560ea48c0
-
SSDEEP
1536:9qskXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2etmulgS6pY:rCgzWHY3+zi0ZbYe1g0ujyzdqY
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
Malware Config
Extracted
redline
Exodus
93.123.39.68:1334
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
93.123.39.68:4449
kszghixltbdczq
-
delay
1
-
install
true
-
install_file
chromeupdate.exe
-
install_folder
%AppData%
Targets
-
-
Target
file.exe
-
Size
95KB
-
MD5
57935225dcb95b6ed9894d5d5e8b46a8
-
SHA1
1daf36a8db0b79be94a41d27183e4904a1340990
-
SHA256
79d7b0f170471f44ed6c07ddb4c4c9bb20c97235aef23ac052e692cb558a156d
-
SHA512
1b6362bdb7f6b177773357f5fe8e7d7ee44716fd8e63e663e446f4e204af581491d05345c12cd9cca91fd249383817da21ef2241011cdc251b7e299560ea48c0
-
SSDEEP
1536:9qskXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2etmulgS6pY:rCgzWHY3+zi0ZbYe1g0ujyzdqY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-