General
-
Target
7da8532f8079b65e932d2923949bf6e8885fe5fbc96e36a67dddfa9967df271c
-
Size
664KB
-
Sample
240315-bhlhysch5v
-
MD5
0072b23f74d405feb1c244ee4aaced80
-
SHA1
9eccaf8981c27d8e7a75b367f64e8e78a4fd117a
-
SHA256
7da8532f8079b65e932d2923949bf6e8885fe5fbc96e36a67dddfa9967df271c
-
SHA512
50a278b53bbcf02cdcaf64e7cf0265506197cee22b0512ad2b80aaa1f30cdce183f2fabf96b60813d91ff77f1cff50f62816ba2493e4957b66c01afeef59dd19
-
SSDEEP
12288:3A/N9EN4gLoodh3/5geL+UBYZWLd1YslhLD:0N9laBgbUx3YCH
Behavioral task
behavioral1
Sample
7da8532f8079b65e932d2923949bf6e8885fe5fbc96e36a67dddfa9967df271c.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
7da8532f8079b65e932d2923949bf6e8885fe5fbc96e36a67dddfa9967df271c
-
Size
664KB
-
MD5
0072b23f74d405feb1c244ee4aaced80
-
SHA1
9eccaf8981c27d8e7a75b367f64e8e78a4fd117a
-
SHA256
7da8532f8079b65e932d2923949bf6e8885fe5fbc96e36a67dddfa9967df271c
-
SHA512
50a278b53bbcf02cdcaf64e7cf0265506197cee22b0512ad2b80aaa1f30cdce183f2fabf96b60813d91ff77f1cff50f62816ba2493e4957b66c01afeef59dd19
-
SSDEEP
12288:3A/N9EN4gLoodh3/5geL+UBYZWLd1YslhLD:0N9laBgbUx3YCH
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-