General
-
Target
driver1.exe
-
Size
513KB
-
Sample
240127-rtsdmsfggl
-
MD5
ecd563c8ea2125310eada2daac93251a
-
SHA1
1d8e53b0d094b51f5db03d8bdffbeafde33ddaf0
-
SHA256
77fbf732a2e1869f995d5d5d38a1ac0b35edba9a83ed557d8abb45dec9bbd604
-
SHA512
be722be655e3ec4aef28651f9fe21cfa48af3abe2aa2c8158e991d75115bcaf8ceebf31737c54cae565c86fa275c252bf68dae5cb2e257c232cea7e61277bece
-
SSDEEP
6144:Vy55yyymLLkkGGt/+9bBfgcqVXCtKPIszeQYsqRCbIW/Ib4YzCm/Db+3Hsj0OrPJ:VL2yttQYsqREcYmL63MoWyw/539HDn
Malware Config
Targets
-
-
Target
driver1.exe
-
Size
513KB
-
MD5
ecd563c8ea2125310eada2daac93251a
-
SHA1
1d8e53b0d094b51f5db03d8bdffbeafde33ddaf0
-
SHA256
77fbf732a2e1869f995d5d5d38a1ac0b35edba9a83ed557d8abb45dec9bbd604
-
SHA512
be722be655e3ec4aef28651f9fe21cfa48af3abe2aa2c8158e991d75115bcaf8ceebf31737c54cae565c86fa275c252bf68dae5cb2e257c232cea7e61277bece
-
SSDEEP
6144:Vy55yyymLLkkGGt/+9bBfgcqVXCtKPIszeQYsqRCbIW/Ib4YzCm/Db+3Hsj0OrPJ:VL2yttQYsqREcYmL63MoWyw/539HDn
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-