General
-
Target
a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e
-
Size
315KB
-
Sample
240507-yxnm7ade4x
-
MD5
3df2b69307e1512f14295f2e90f9668d
-
SHA1
8bfb6b38adbd60b9457033738587fa91a5c59b21
-
SHA256
a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e
-
SHA512
6dcd1dde8d2add0b8d97829adb446b1293899dc91d031796ea8acad26fc0b890b68981aec6e4e1c7078a434fcb0b353e687983626372a5d0a2bfc8c428201012
-
SSDEEP
6144:NV9pI60nbM8uPZy3+8KIDp/uBADtHlAX3DXC2mz+xBYT2EAMKFXHS:f9+60nbnuG/ztFAXtBgAMKlHS
Static task
static1
Behavioral task
behavioral1
Sample
a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e.exe
Resource
win11-20240419-en
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Targets
-
-
Target
a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e
-
Size
315KB
-
MD5
3df2b69307e1512f14295f2e90f9668d
-
SHA1
8bfb6b38adbd60b9457033738587fa91a5c59b21
-
SHA256
a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e
-
SHA512
6dcd1dde8d2add0b8d97829adb446b1293899dc91d031796ea8acad26fc0b890b68981aec6e4e1c7078a434fcb0b353e687983626372a5d0a2bfc8c428201012
-
SSDEEP
6144:NV9pI60nbM8uPZy3+8KIDp/uBADtHlAX3DXC2mz+xBYT2EAMKFXHS:f9+60nbnuG/ztFAXtBgAMKlHS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-