General
-
Target
76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600
-
Size
260KB
-
Sample
240506-qgqtlsfg92
-
MD5
040cf9e542e109f557ee2373f885b15e
-
SHA1
d3889f1dcec4d92f68ec74aea4b6d03048b9b779
-
SHA256
76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600
-
SHA512
185c68573f303b8aa700a179b5a6d0688da996a2532dc235ca77895391940c48d14533bdbd8ff3097e4e4fe25236bdf7a7d27b971946fcd9bf2efb8be94d1519
-
SSDEEP
3072:jI0qv0kub3P4BJB3ZxC9UistsiKhQMDjYu9XTDuCCk7iVRiX83zE3REFlAYK/UxF:Pqv0/b3WJzihbDjt9D6CC0RkzGmFLj
Behavioral task
behavioral1
Sample
76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
redline
708370717
https://pastebin.com/raw/KE5Mft0T
Targets
-
-
Target
76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600
-
Size
260KB
-
MD5
040cf9e542e109f557ee2373f885b15e
-
SHA1
d3889f1dcec4d92f68ec74aea4b6d03048b9b779
-
SHA256
76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600
-
SHA512
185c68573f303b8aa700a179b5a6d0688da996a2532dc235ca77895391940c48d14533bdbd8ff3097e4e4fe25236bdf7a7d27b971946fcd9bf2efb8be94d1519
-
SSDEEP
3072:jI0qv0kub3P4BJB3ZxC9UistsiKhQMDjYu9XTDuCCk7iVRiX83zE3REFlAYK/UxF:Pqv0/b3WJzihbDjt9D6CC0RkzGmFLj
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-