General
-
Target
51a759f98a18ef3e6b4e91fa32dc5319ccc5121eb77ac28cfa0579d30af7d8e8.exe
-
Size
260KB
-
Sample
240507-bm9rcabh3t
-
MD5
2529a7bbbdf0b297c2bcbde40bca3671
-
SHA1
5f674bfb89857da5ce013ec8f360f9e6453333c4
-
SHA256
51a759f98a18ef3e6b4e91fa32dc5319ccc5121eb77ac28cfa0579d30af7d8e8
-
SHA512
cd6f332a16d41b3608b074f44c80b6491a9480544776d2c2fc5c9cb6d33362be0e06f6ac702eb36b9d4907784bb3c26a668796db68cb5c12f14c8b1aa73969e2
-
SSDEEP
6144:sqv0ib3cJzO0HxjGE4ujgbAh/sGBachoRux:jb3IfHhOb4U8achoRux
Behavioral task
behavioral1
Sample
51a759f98a18ef3e6b4e91fa32dc5319ccc5121eb77ac28cfa0579d30af7d8e8.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
51a759f98a18ef3e6b4e91fa32dc5319ccc5121eb77ac28cfa0579d30af7d8e8.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Targets
-
-
Target
51a759f98a18ef3e6b4e91fa32dc5319ccc5121eb77ac28cfa0579d30af7d8e8.exe
-
Size
260KB
-
MD5
2529a7bbbdf0b297c2bcbde40bca3671
-
SHA1
5f674bfb89857da5ce013ec8f360f9e6453333c4
-
SHA256
51a759f98a18ef3e6b4e91fa32dc5319ccc5121eb77ac28cfa0579d30af7d8e8
-
SHA512
cd6f332a16d41b3608b074f44c80b6491a9480544776d2c2fc5c9cb6d33362be0e06f6ac702eb36b9d4907784bb3c26a668796db68cb5c12f14c8b1aa73969e2
-
SSDEEP
6144:sqv0ib3cJzO0HxjGE4ujgbAh/sGBachoRux:jb3IfHhOb4U8achoRux
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-