General
-
Target
8212f1a4150a87f42e0341b3bd2f8c111109c1922937e70eba8c7cf8b4588a43
-
Size
5.3MB
-
Sample
240727-aavk8atarq
-
MD5
86fbf5c13fa45456d853800bb5eeb1ea
-
SHA1
818728bdc9846d3b8a577c6a3addac298697cc7c
-
SHA256
8212f1a4150a87f42e0341b3bd2f8c111109c1922937e70eba8c7cf8b4588a43
-
SHA512
9e38904c0367cf975c1753060a208cf528226457efd9c187698b7f778a003e296320d9e6b14484978e376ebf6397471145de89e8a7235bc0534c0d3d0be9c190
-
SSDEEP
49152:y1fVnYqmMSRHo1EH5vubldXz+poyyeFJfio7g2FZ720ldC:uVh
Static task
static1
Behavioral task
behavioral1
Sample
8212f1a4150a87f42e0341b3bd2f8c111109c1922937e70eba8c7cf8b4588a43.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8212f1a4150a87f42e0341b3bd2f8c111109c1922937e70eba8c7cf8b4588a43.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
8212f1a4150a87f42e0341b3bd2f8c111109c1922937e70eba8c7cf8b4588a43
-
Size
5.3MB
-
MD5
86fbf5c13fa45456d853800bb5eeb1ea
-
SHA1
818728bdc9846d3b8a577c6a3addac298697cc7c
-
SHA256
8212f1a4150a87f42e0341b3bd2f8c111109c1922937e70eba8c7cf8b4588a43
-
SHA512
9e38904c0367cf975c1753060a208cf528226457efd9c187698b7f778a003e296320d9e6b14484978e376ebf6397471145de89e8a7235bc0534c0d3d0be9c190
-
SSDEEP
49152:y1fVnYqmMSRHo1EH5vubldXz+poyyeFJfio7g2FZ720ldC:uVh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1