General
-
Target
930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff
-
Size
267KB
-
Sample
240509-c1vp1sdg4v
-
MD5
1d3c789eafd1104c4658a1764c762ed6
-
SHA1
87d1f05c9a8bfc6eafaa33456f9584ae281539fc
-
SHA256
930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff
-
SHA512
91b0c3233058334ee67aca000e40e954746982e921ed6e7ada8ecfb64135978a84703389206381f97069ae7dcc09cc029ffadebc653c94615a87ccf2ce0a0be4
-
SSDEEP
6144:QROllhS4qdxjPxUUsMk6qhI+ulYm85i1D2KD8MmmKU:6U/SNRY6gI+uGr5isKDBKU
Static task
static1
Behavioral task
behavioral1
Sample
930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff.exe
Resource
win11-20240419-en
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Targets
-
-
Target
930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff
-
Size
267KB
-
MD5
1d3c789eafd1104c4658a1764c762ed6
-
SHA1
87d1f05c9a8bfc6eafaa33456f9584ae281539fc
-
SHA256
930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff
-
SHA512
91b0c3233058334ee67aca000e40e954746982e921ed6e7ada8ecfb64135978a84703389206381f97069ae7dcc09cc029ffadebc653c94615a87ccf2ce0a0be4
-
SSDEEP
6144:QROllhS4qdxjPxUUsMk6qhI+ulYm85i1D2KD8MmmKU:6U/SNRY6gI+uGr5isKDBKU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-