General
-
Target
927fa2810d057f5b7740f9fd3d0af3c9.bin
-
Size
317KB
-
Sample
240122-cycfnaeddj
-
MD5
bd8e36bd5f1a72c35e90ef0c565cffda
-
SHA1
0e1fdce57a4faa4a1656a999583f48a0c12e6275
-
SHA256
e5331799723ae13300f9a49b5588662a116adf662d373e4fea33c3b13b636b40
-
SHA512
7cc96025534ea6e3ab94ce75257f9a9a652a9b936bc16e3d38f13d854424338839d914c71ed7da828489e1b96c5edeb04a731edf32bc74187270b30ad467d42f
-
SSDEEP
6144:/sIdyErr7JsSYUNIjzLjxJNbgkS2VVIKA7Br1kDGznje:/dUIpsSYkIjzZVS2VxIB2snC
Static task
static1
Behavioral task
behavioral1
Sample
9285f56d3f84131e78d09d2b85dad48a871eec4702cb6494e9c46a24f70e50f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9285f56d3f84131e78d09d2b85dad48a871eec4702cb6494e9c46a24f70e50f9.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
redline
@RLREBORN Cloud TG: @FATHEROFCARDERS)
141.95.211.148:46011
Targets
-
-
Target
9285f56d3f84131e78d09d2b85dad48a871eec4702cb6494e9c46a24f70e50f9.exe
-
Size
329KB
-
MD5
927fa2810d057f5b7740f9fd3d0af3c9
-
SHA1
b75d4c86d3b4fd9d6ecf4be05d9ebcf4d7fd7ec8
-
SHA256
9285f56d3f84131e78d09d2b85dad48a871eec4702cb6494e9c46a24f70e50f9
-
SHA512
54af68949da4520c87e24d613817003705e8e50d3006e81dcf5d924003c1a1b8185ba89f6878c0abac61f34efbe7a9233f28ba3e678a35983c1e74216a5ac1a8
-
SSDEEP
6144:Y2A0vtQBor7oi2eemoLa9VBdH/Mz1KKd619AqUAwZuav:FA0v4ovo8NoLm5s5duBUAwJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-