General
-
Target
babf69c12509b78916b78b8c2da8e4c0N.exe
-
Size
896KB
-
Sample
240802-t2dlkawdlh
-
MD5
babf69c12509b78916b78b8c2da8e4c0
-
SHA1
a2a207578a697b60fcc27f308369f68cf63ff7a2
-
SHA256
8537f02cc46c05cfea39a7920c6f40f0298fa92ec3338e025edb43c59010ad70
-
SHA512
186dd05610acceea0817be6c770f376d553bbd7a0b437e0e5536b4afc6e0ad3ebb5a7b765f4044ed3ad30f42805607b0875b57a59c82ed2131e1d45683656722
-
SSDEEP
24576:KwqZ/xSjbuxymLA6NTTNTob8bsYdcA21d:lOBxn3pTJWY2A2X
Static task
static1
Behavioral task
behavioral1
Sample
babf69c12509b78916b78b8c2da8e4c0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
babf69c12509b78916b78b8c2da8e4c0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
linkedin721
88.99.151.68:7200
Targets
-
-
Target
babf69c12509b78916b78b8c2da8e4c0N.exe
-
Size
896KB
-
MD5
babf69c12509b78916b78b8c2da8e4c0
-
SHA1
a2a207578a697b60fcc27f308369f68cf63ff7a2
-
SHA256
8537f02cc46c05cfea39a7920c6f40f0298fa92ec3338e025edb43c59010ad70
-
SHA512
186dd05610acceea0817be6c770f376d553bbd7a0b437e0e5536b4afc6e0ad3ebb5a7b765f4044ed3ad30f42805607b0875b57a59c82ed2131e1d45683656722
-
SSDEEP
24576:KwqZ/xSjbuxymLA6NTTNTob8bsYdcA21d:lOBxn3pTJWY2A2X
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2