General
-
Target
781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95
-
Size
118KB
-
Sample
240507-ca6dtsgb57
-
MD5
3f3a989bd22532dfc6d733b0fae7ba51
-
SHA1
219c676f44fa2bf085e797080d7a0b68984b20e3
-
SHA256
781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95
-
SHA512
143950aea3b2f447fc65ab2ad57bad83fbfaf9608721ea67bc5f10a171c96ab9e8330ea0a534c16a4bea4884759f8a1a95cd090dd7e30b12fec6700c1f9f4ede
-
SSDEEP
1536:v6mcgrfQlGkiWXJ+dJtN3MjSEX+bsDf3Ok3i5QB5weq5Lk9fq+6yf6HZyW:6l9iQJ+dx3MjTlPy5QBU5AFq+6c6HZT
Static task
static1
Behavioral task
behavioral1
Sample
781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
708370717
https://pastebin.com/raw/KE5Mft0T
Targets
-
-
Target
781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95
-
Size
118KB
-
MD5
3f3a989bd22532dfc6d733b0fae7ba51
-
SHA1
219c676f44fa2bf085e797080d7a0b68984b20e3
-
SHA256
781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95
-
SHA512
143950aea3b2f447fc65ab2ad57bad83fbfaf9608721ea67bc5f10a171c96ab9e8330ea0a534c16a4bea4884759f8a1a95cd090dd7e30b12fec6700c1f9f4ede
-
SSDEEP
1536:v6mcgrfQlGkiWXJ+dJtN3MjSEX+bsDf3Ok3i5QB5weq5Lk9fq+6yf6HZyW:6l9iQJ+dx3MjTlPy5QBU5AFq+6c6HZT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-