General
-
Target
f2dfe587e05427000fa7633b7d33a8c95a5ab9e1abe54ab4f67dead149dbdcf2
-
Size
310KB
-
Sample
240822-xt7q8awapl
-
MD5
34428685a2a334123fa86fc13d900736
-
SHA1
ddb63114d8f282df451b4ed06b2324da0fdef9a5
-
SHA256
f2dfe587e05427000fa7633b7d33a8c95a5ab9e1abe54ab4f67dead149dbdcf2
-
SHA512
53984b518c16758e8235ee37543abff3bf8ba0c6dfbc3cdef28f57487775e8671227cb5825406f45f1c5d578e4ae4dd6c56d1abbe3792492c048bd5daa229b7f
-
SSDEEP
6144:fmQl5L6ZeKh6r5H3+pEWuXdrcSmH2XH55rMDp79PjgG4dDpZ18Jmjz:+QlZHqEWu9tMtVjcDpDWmjz
Static task
static1
Behavioral task
behavioral1
Sample
Ехternаl 2.4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Ехternаl 2.4.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
@exelzt
185.215.113.22:80
Targets
-
-
Target
Ехternаl 2.4.exe
-
Size
313KB
-
MD5
2225ba07e4bed2fdd12f2d29d1c1a72c
-
SHA1
29c610f92adb7dbbb497a3fa48f4c887a3484372
-
SHA256
182d7b64bd5299fa03ab74d4ed79c56c31fdc2f48d98b70f8efa438026d97710
-
SHA512
ff2b05ed63b8456a68c269e51e7a605dd7c4b204b1417fbfc511aa10adc56d1b1b1234d71a87d7d753d41e1cd7312c0dc9cf3c3713aa21ff61e843c0e1559242
-
SSDEEP
6144:hrH/AO8NeKh6P5H3spEWuXdfcSmH2X/55rADj79Pjg84dDpZ1nE:hrH/AOb/oEWuFBAPVjEDpDE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2