General
-
Target
TORONTO.exe
-
Size
421KB
-
Sample
240506-nhkmwaac2z
-
MD5
706d2775dcfa672f5b84c1664876d8da
-
SHA1
75a6836382435adc08b7d6c17e52ac51d0208e3f
-
SHA256
35c9ff44006c3ecd283334b1c398a416972a9db1b2b0431b4aa18e7a2222f49d
-
SHA512
36a04a2f6f3e54aeb83d84a2dbad2177c81615d5530789d0092e261d84abffb775b503fc1e651e0cbe58438834532a48c57789cfbaf9895b8b6a707f9bef724b
-
SSDEEP
6144:yqv06b36JzIwBqozqCwcEfqG+XDPcq+Mx5KjxdC4KmOSWdoFp1dDhb:Zb3KRXqC3wQXDNHYQo7L1d5
Behavioral task
behavioral1
Sample
TORONTO.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
TORONTO.exe
-
Size
421KB
-
MD5
706d2775dcfa672f5b84c1664876d8da
-
SHA1
75a6836382435adc08b7d6c17e52ac51d0208e3f
-
SHA256
35c9ff44006c3ecd283334b1c398a416972a9db1b2b0431b4aa18e7a2222f49d
-
SHA512
36a04a2f6f3e54aeb83d84a2dbad2177c81615d5530789d0092e261d84abffb775b503fc1e651e0cbe58438834532a48c57789cfbaf9895b8b6a707f9bef724b
-
SSDEEP
6144:yqv06b36JzIwBqozqCwcEfqG+XDPcq+Mx5KjxdC4KmOSWdoFp1dDhb:Zb3KRXqC3wQXDNHYQo7L1d5
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-