General
-
Target
5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a.exe
-
Size
313KB
-
Sample
240906-bpkj8sybjm
-
MD5
324d2a434b8a3e038661a75587e303b8
-
SHA1
21e1be17da8e401a5928f5cdf5c262cefb305910
-
SHA256
5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a
-
SHA512
eaf7d0393a62b2187614b3234a280d938ac2cbb9659117b39b2d482c909dea207b685ff7be46b4045468628958a03aa460f9dbc71b1566f54f2f252c934fd374
-
SSDEEP
6144:xJcrjyufnjS1Ht3pHjDNItvNoCOD6iuh52HK7q1BU0H:HUuufjSVbJnn650K21
Static task
static1
Behavioral task
behavioral1
Sample
5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
@PORETYNOJEM
185.215.113.22:80
Targets
-
-
Target
5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a.exe
-
Size
313KB
-
MD5
324d2a434b8a3e038661a75587e303b8
-
SHA1
21e1be17da8e401a5928f5cdf5c262cefb305910
-
SHA256
5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a
-
SHA512
eaf7d0393a62b2187614b3234a280d938ac2cbb9659117b39b2d482c909dea207b685ff7be46b4045468628958a03aa460f9dbc71b1566f54f2f252c934fd374
-
SSDEEP
6144:xJcrjyufnjS1Ht3pHjDNItvNoCOD6iuh52HK7q1BU0H:HUuufjSVbJnn650K21
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2