General
-
Target
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe.exe
-
Size
547KB
-
Sample
240806-bmk3zsydlb
-
MD5
731e0addfe7c32066783fa33db494eff
-
SHA1
29f628362813b3b03c1eaae29d8230c3bc4485ab
-
SHA256
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe
-
SHA512
6dbb7fb9bb29c45011ad6017d3e7db928079888d85d9d32eef6b816e7350a49b5df3c47f7ae71ca2e829e95f3ecc2205dad48e29a011a71f557b44fdfa2ad949
-
SSDEEP
12288:sfhF1ROYYCrqEp3fWhcueuF16B1ROmYnHglvlynf/y8:6cVMp3uRbF2EHgVlAf
Static task
static1
Behavioral task
behavioral1
Sample
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Targets
-
-
Target
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe.exe
-
Size
547KB
-
MD5
731e0addfe7c32066783fa33db494eff
-
SHA1
29f628362813b3b03c1eaae29d8230c3bc4485ab
-
SHA256
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe
-
SHA512
6dbb7fb9bb29c45011ad6017d3e7db928079888d85d9d32eef6b816e7350a49b5df3c47f7ae71ca2e829e95f3ecc2205dad48e29a011a71f557b44fdfa2ad949
-
SSDEEP
12288:sfhF1ROYYCrqEp3fWhcueuF16B1ROmYnHglvlynf/y8:6cVMp3uRbF2EHgVlAf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2