General
-
Target
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82
-
Size
315KB
-
Sample
240507-zalezsed2z
-
MD5
8593635e7692a063e8ffdf017a1b8b7f
-
SHA1
efcd70922a3d3577e617ff3fe78bbeeca43648e7
-
SHA256
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82
-
SHA512
bd46e1344bb1c577260517fbecd126942b56b7e69c476af8ef6c3f104d96c3e5e1277be974b678af490a957ce6d3bbf7ad0f99911dc3dc68606a4981affe1c16
-
SSDEEP
6144:mi9pI60nbM8uPZy3+8KIDFquxMFQEjKP1dN9Vm8D5p9PGP0FXHS:/9+60nbnu6qaE7ePrN9D5p9nHS
Static task
static1
Behavioral task
behavioral1
Sample
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
redline
708370717
https://pastebin.com/raw/KE5Mft0T
Targets
-
-
Target
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82
-
Size
315KB
-
MD5
8593635e7692a063e8ffdf017a1b8b7f
-
SHA1
efcd70922a3d3577e617ff3fe78bbeeca43648e7
-
SHA256
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82
-
SHA512
bd46e1344bb1c577260517fbecd126942b56b7e69c476af8ef6c3f104d96c3e5e1277be974b678af490a957ce6d3bbf7ad0f99911dc3dc68606a4981affe1c16
-
SSDEEP
6144:mi9pI60nbM8uPZy3+8KIDFquxMFQEjKP1dN9Vm8D5p9PGP0FXHS:/9+60nbnu6qaE7ePrN9D5p9nHS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-