General
-
Target
dae690c700dd9bfe65154f5ae64a1c439d8792d26fc858b41d2590e166588859.exe
-
Size
260KB
-
Sample
240507-b7pxnsch9y
-
MD5
a2466ea70c75882f52d953e56edc3d15
-
SHA1
5a9b7af35e4665593b86e5027a5c0cdaf2065c2c
-
SHA256
dae690c700dd9bfe65154f5ae64a1c439d8792d26fc858b41d2590e166588859
-
SHA512
d0818466fe8226fa10e717f7ef7a2e81871fe48c4ffd30bd88a6df2ee4f5130a58156b400ad301ae769f182cbcea817bdbb3251096e3e61b1fa9b4e6a687dbbb
-
SSDEEP
3072:DI0qv0ESbb384iJB3Z8QpKpswGbSp4rpdEjEL79N4Ej3AOkCVSfaZ7KKnzFu3wCU:vqv0lb3oJz5SiwE1Tj3AOkqjUgCU
Behavioral task
behavioral1
Sample
dae690c700dd9bfe65154f5ae64a1c439d8792d26fc858b41d2590e166588859.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dae690c700dd9bfe65154f5ae64a1c439d8792d26fc858b41d2590e166588859.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Targets
-
-
Target
dae690c700dd9bfe65154f5ae64a1c439d8792d26fc858b41d2590e166588859.exe
-
Size
260KB
-
MD5
a2466ea70c75882f52d953e56edc3d15
-
SHA1
5a9b7af35e4665593b86e5027a5c0cdaf2065c2c
-
SHA256
dae690c700dd9bfe65154f5ae64a1c439d8792d26fc858b41d2590e166588859
-
SHA512
d0818466fe8226fa10e717f7ef7a2e81871fe48c4ffd30bd88a6df2ee4f5130a58156b400ad301ae769f182cbcea817bdbb3251096e3e61b1fa9b4e6a687dbbb
-
SSDEEP
3072:DI0qv0ESbb384iJB3Z8QpKpswGbSp4rpdEjEL79N4Ej3AOkCVSfaZ7KKnzFu3wCU:vqv0lb3oJz5SiwE1Tj3AOkqjUgCU
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-