General
-
Target
f8e5f80e0d7f014525ec27432c1106ef0eb2f8652f9881c392a49ee9b61f0069
-
Size
260KB
-
Sample
240506-ntcreadg39
-
MD5
b1bddad197aa2eca1941f6d6b507a84d
-
SHA1
da9ef7508f650760898a6f420f6f14d8867924b2
-
SHA256
f8e5f80e0d7f014525ec27432c1106ef0eb2f8652f9881c392a49ee9b61f0069
-
SHA512
d5757f803a6a724284cffc84ec2c270f744a65a8cc51e5aef34ffdac4f6e71d917d54030ed22107e2499b9553914978507de16286906f7c6fcd52a349a5ca6da
-
SSDEEP
6144:Xqv0Ob3uJz/4y5djkEnakgFqE1XstX1aZ:0b3m/4y5F1a/FqAXstX8
Behavioral task
behavioral1
Sample
f8e5f80e0d7f014525ec27432c1106ef0eb2f8652f9881c392a49ee9b61f0069.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
f8e5f80e0d7f014525ec27432c1106ef0eb2f8652f9881c392a49ee9b61f0069.exe
Resource
win11-20240419-en
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Targets
-
-
Target
f8e5f80e0d7f014525ec27432c1106ef0eb2f8652f9881c392a49ee9b61f0069
-
Size
260KB
-
MD5
b1bddad197aa2eca1941f6d6b507a84d
-
SHA1
da9ef7508f650760898a6f420f6f14d8867924b2
-
SHA256
f8e5f80e0d7f014525ec27432c1106ef0eb2f8652f9881c392a49ee9b61f0069
-
SHA512
d5757f803a6a724284cffc84ec2c270f744a65a8cc51e5aef34ffdac4f6e71d917d54030ed22107e2499b9553914978507de16286906f7c6fcd52a349a5ca6da
-
SSDEEP
6144:Xqv0Ob3uJz/4y5djkEnakgFqE1XstX1aZ:0b3m/4y5F1a/FqAXstX8
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-