General
-
Target
surfex.exe
-
Size
310KB
-
Sample
240826-erjx9swbjn
-
MD5
1f4b0637137572a1fb34aaa033149506
-
SHA1
c209c9a60a752bc7980a3d9d53daf4b4b32973a9
-
SHA256
60c645c0a668c13ad36d2d5b67777dedf992e392e652e7f0519f21d658254648
-
SHA512
4fd27293437b8bf77d15d993da2b0e75c9fba93bd5f94dad439a3e2e4c16c444f6a32543271f1d2ad79c220354b23301e544765ca392fc156267a89338452e86
-
SSDEEP
6144:Zm1G61auNh8PDtyJvsHP+iVQmoc2RZ4cm++pBESrvD6ClOC:6GaxO5rHPkmojzAr6C8
Static task
static1
Behavioral task
behavioral1
Sample
surfex.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
surfex.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
TG@CVV88888
185.218.125.157:21441
Targets
-
-
Target
surfex.exe
-
Size
310KB
-
MD5
1f4b0637137572a1fb34aaa033149506
-
SHA1
c209c9a60a752bc7980a3d9d53daf4b4b32973a9
-
SHA256
60c645c0a668c13ad36d2d5b67777dedf992e392e652e7f0519f21d658254648
-
SHA512
4fd27293437b8bf77d15d993da2b0e75c9fba93bd5f94dad439a3e2e4c16c444f6a32543271f1d2ad79c220354b23301e544765ca392fc156267a89338452e86
-
SSDEEP
6144:Zm1G61auNh8PDtyJvsHP+iVQmoc2RZ4cm++pBESrvD6ClOC:6GaxO5rHPkmojzAr6C8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2