General
-
Target
50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48
-
Size
260KB
-
Sample
240506-p1gvdafc56
-
MD5
169ad47baa298cb8cadd64a54a3e3bb2
-
SHA1
9ced7724ff62eda4927322de1aafeba3e8c535db
-
SHA256
50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48
-
SHA512
d2f99c1e34d753ee5ae819b1dedab08e852c6b7eea7ce88234f8cef7d91c5c0b414156db4574bab817a80592f18e1094e7410f63f76a2dd02e3115edba329861
-
SSDEEP
3072:7I0qv0Gb384RJB3ZvxCZzsem/fOfhiSXBu9rj7dC14L20gbLzydr/U2WKoAXJ/UT:nqv0Gb3TJzyZiUS34yNUVKoq0
Behavioral task
behavioral1
Sample
50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48.exe
Resource
win11-20240419-en
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Targets
-
-
Target
50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48
-
Size
260KB
-
MD5
169ad47baa298cb8cadd64a54a3e3bb2
-
SHA1
9ced7724ff62eda4927322de1aafeba3e8c535db
-
SHA256
50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48
-
SHA512
d2f99c1e34d753ee5ae819b1dedab08e852c6b7eea7ce88234f8cef7d91c5c0b414156db4574bab817a80592f18e1094e7410f63f76a2dd02e3115edba329861
-
SSDEEP
3072:7I0qv0Gb384RJB3ZvxCZzsem/fOfhiSXBu9rj7dC14L20gbLzydr/U2WKoAXJ/UT:nqv0Gb3TJzyZiUS34yNUVKoq0
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-