General
-
Target
076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922
-
Size
260KB
-
Sample
240506-nfn8aaab6x
-
MD5
843da5c76b23673abbe86ed571fa4b9d
-
SHA1
920df3ea434aad34f804dd11b524bd7e70b22891
-
SHA256
076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922
-
SHA512
012eddd2914273ab6190e2a81f0d3913feba93a214886a24f0af60e447313b378a6948645d1b40b92285ddba21a75bd66cc785f730c4a23e1e5acedce303b0ae
-
SSDEEP
3072:TI0qv0Cb3v4eJB3ZOvfEszyp+X4nheAebX5uCUzqyHR1TZvVbeJVRr66UxF:fqv0Cb3lJzYf4nIN8BLHHbaLQ
Behavioral task
behavioral1
Sample
076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922.exe
Resource
win11-20240419-en
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Targets
-
-
Target
076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922
-
Size
260KB
-
MD5
843da5c76b23673abbe86ed571fa4b9d
-
SHA1
920df3ea434aad34f804dd11b524bd7e70b22891
-
SHA256
076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922
-
SHA512
012eddd2914273ab6190e2a81f0d3913feba93a214886a24f0af60e447313b378a6948645d1b40b92285ddba21a75bd66cc785f730c4a23e1e5acedce303b0ae
-
SSDEEP
3072:TI0qv0Cb3v4eJB3ZOvfEszyp+X4nheAebX5uCUzqyHR1TZvVbeJVRr66UxF:fqv0Cb3lJzYf4nIN8BLHHbaLQ
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-