General
-
Target
98c5e7aa76e1163df1ac5ea880c213a8b81a2c5b2ba0d87980ac8ffa744f226f.exe
-
Size
304KB
-
Sample
240505-yhzrxaca8t
-
MD5
0222f8da926bf2722f6bef4ac243e5fa
-
SHA1
152144479eb94028ec92e356f99b562fa414e980
-
SHA256
98c5e7aa76e1163df1ac5ea880c213a8b81a2c5b2ba0d87980ac8ffa744f226f
-
SHA512
690cc96b3ff6bc3e801b6c142c34afa81feb45e4916898cea0a3ddae41c8aa2b9a794886c2275dd2396e378402e4182209e037a8094fc6e08ce3764e5cbf9999
-
SSDEEP
3072:2qq6EgY6iYrUjOU44wPdyWAqeGXHTAftAmKOhcZqf7D34deqiOLibBOM:2pqY6irwPfASXHTA1A4hcZqf7DInL
Behavioral task
behavioral1
Sample
98c5e7aa76e1163df1ac5ea880c213a8b81a2c5b2ba0d87980ac8ffa744f226f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98c5e7aa76e1163df1ac5ea880c213a8b81a2c5b2ba0d87980ac8ffa744f226f.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
redline
uk-ca
80.79.4.61:27996
Targets
-
-
Target
98c5e7aa76e1163df1ac5ea880c213a8b81a2c5b2ba0d87980ac8ffa744f226f.exe
-
Size
304KB
-
MD5
0222f8da926bf2722f6bef4ac243e5fa
-
SHA1
152144479eb94028ec92e356f99b562fa414e980
-
SHA256
98c5e7aa76e1163df1ac5ea880c213a8b81a2c5b2ba0d87980ac8ffa744f226f
-
SHA512
690cc96b3ff6bc3e801b6c142c34afa81feb45e4916898cea0a3ddae41c8aa2b9a794886c2275dd2396e378402e4182209e037a8094fc6e08ce3764e5cbf9999
-
SSDEEP
3072:2qq6EgY6iYrUjOU44wPdyWAqeGXHTAftAmKOhcZqf7D34deqiOLibBOM:2pqY6irwPfASXHTA1A4hcZqf7DInL
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-