General
-
Target
Ехternаl.zip
-
Size
310KB
-
Sample
240824-pnjs7szdqd
-
MD5
e038e740aeb263c6d36db05f0d3b9068
-
SHA1
15f0a6c403b0253f1f664a306e6bc8a2aa5088ff
-
SHA256
979decdb0899c752e241420fc656ae4fd0b16f959981068d7ab484045832d78e
-
SHA512
e4eec920dd51de00c961c2307ea9dbf5dba59ef476b027b40f9158a49f453cbdee183b3d6b25554db1e82bbedffe55bb6f56ea5b49ec35ac5dc8ac396db91092
-
SSDEEP
6144:9fiTAYgxcpZy/bIaFei0/f8LYRNkaFOh0gqJqyqymIhGJ2+J1qBcqQrSenfYJ:B5szYZNhAOh2JqghGJVJ1qBkGe+
Static task
static1
Behavioral task
behavioral1
Sample
Ехternаl 2.4.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
@exelzt
185.215.113.22:80
Targets
-
-
Target
Ехternаl 2.4.exe
-
Size
313KB
-
MD5
01c7563d3be6f0913926d08fa65ff7d7
-
SHA1
60575b45e7bdfa5c8cb9d3c0e07a854cffb2d1bd
-
SHA256
fa42848040ec7b89414e7d85211aabd15f9654a9006d0507c4e52fea7284029b
-
SHA512
e3f05f5a4179c7e98c3309e18b18285be0b38943a4989e53307bf6b203d5d682bf89eef1e04815bc6930d21b5e1a96f88235e2486288af1e0933aaeb0b5ad2ba
-
SSDEEP
6144:dDhpzkHxcpBy/bIaFeQ0/f8LYDNkaFOh08qJquqygIhGN2+J1qBcuzIjc:d/wqHY5NpAOhIJqghGNVJ1qBKjc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2