General
-
Target
afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624.exe
-
Size
464KB
-
Sample
240320-c2kansfd6v
-
MD5
c084d6f6ba40534fbfc5a64b21ef99ab
-
SHA1
0b4a17da83c0a8abbc8fab321931d5447b32b720
-
SHA256
afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
-
SHA512
a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
SSDEEP
6144:h0N6TGtpSTJWG3/ss3pVlIp7dwx+r7nF0l79bAh54QcJNSd1LLNI94sfPfJ/+lw+:hfGtWJdLPlEXvOlmj4QcJNS7LRgJhXz
Behavioral task
behavioral1
Sample
afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
LiveTraffic
4.185.137.132:1632
Targets
-
-
Target
afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624.exe
-
Size
464KB
-
MD5
c084d6f6ba40534fbfc5a64b21ef99ab
-
SHA1
0b4a17da83c0a8abbc8fab321931d5447b32b720
-
SHA256
afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
-
SHA512
a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
SSDEEP
6144:h0N6TGtpSTJWG3/ss3pVlIp7dwx+r7nF0l79bAh54QcJNSd1LLNI94sfPfJ/+lw+:hfGtWJdLPlEXvOlmj4QcJNS7LRgJhXz
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-