General
-
Target
142.exe
-
Size
260KB
-
Sample
240505-y8rtzsda5z
-
MD5
4998ab8ddf0fb46a4c208e467d8c93d6
-
SHA1
dacdde1fe3031df8bdf51437f64156ea14834479
-
SHA256
3536c0d20896aad0befd60d07c594535f44e05fc480d5d4f3555cc492c4aa41d
-
SHA512
5a143f18050a5a77921376c8633badf1c4fb05ff5335f4490ee58be34f2b453fd2761f23ead3f0d0510d43251c962d4d8eceba6772db5c25c502618f3633f14e
-
SSDEEP
3072:5I0qv0cb3j43JB3Z1441sMEY7bDhBlxVRAkz2WkvO9ud4u8g3wPUjZRHhG6nv5/u:Rqv0cb38Jz2MflxVRjjmZjTBZk
Behavioral task
behavioral1
Sample
142.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
142.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Targets
-
-
Target
142.exe
-
Size
260KB
-
MD5
4998ab8ddf0fb46a4c208e467d8c93d6
-
SHA1
dacdde1fe3031df8bdf51437f64156ea14834479
-
SHA256
3536c0d20896aad0befd60d07c594535f44e05fc480d5d4f3555cc492c4aa41d
-
SHA512
5a143f18050a5a77921376c8633badf1c4fb05ff5335f4490ee58be34f2b453fd2761f23ead3f0d0510d43251c962d4d8eceba6772db5c25c502618f3633f14e
-
SSDEEP
3072:5I0qv0cb3j43JB3Z1441sMEY7bDhBlxVRAkz2WkvO9ud4u8g3wPUjZRHhG6nv5/u:Rqv0cb38Jz2MflxVRjjmZjTBZk
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-