General
-
Target
x_debloated.exe
-
Size
1.1MB
-
Sample
240513-w2ngwagg8t
-
MD5
007ce165ab3ed52fd01260e28583630e
-
SHA1
e8940ff704d7545e2c4049cf556ebe6c4b13f07b
-
SHA256
3478cb72674de4bbfbabd812e9383008bee123374ccdce446ceb8ed58a209b05
-
SHA512
acd79dab95c89f6421626d07ffc291ad2f8fbcbef046cb9612820ea454c5f5d1b2f77713b69c07b3293c93fe53411eed2cd0d25a8da6bb97cc6d23a649f690bd
-
SSDEEP
24576:lIHCA1uqM1oatbwvRpIgPAW88D6zNVBs6:EuqM1oatUvR/gjBn
Static task
static1
Behavioral task
behavioral1
Sample
x_debloated.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
x_debloated.exe
-
Size
1.1MB
-
MD5
007ce165ab3ed52fd01260e28583630e
-
SHA1
e8940ff704d7545e2c4049cf556ebe6c4b13f07b
-
SHA256
3478cb72674de4bbfbabd812e9383008bee123374ccdce446ceb8ed58a209b05
-
SHA512
acd79dab95c89f6421626d07ffc291ad2f8fbcbef046cb9612820ea454c5f5d1b2f77713b69c07b3293c93fe53411eed2cd0d25a8da6bb97cc6d23a649f690bd
-
SSDEEP
24576:lIHCA1uqM1oatbwvRpIgPAW88D6zNVBs6:EuqM1oatUvR/gjBn
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-