General
-
Target
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53
-
Size
1.1MB
-
Sample
240919-bmv8ystbnl
-
MD5
4b0f5b53264c56125bd5c889e063bbca
-
SHA1
af67f0e3380e79157505e9372922e372ca28fdeb
-
SHA256
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53
-
SHA512
39ac9635eda068f758ff2ece2997100e9cabb254c02e4abb374b99fa415554369273a957ef51209fd0df624db1792bbb30a7f7da96015a7e98df73d290dae0ac
-
SSDEEP
24576:xQYmBqkDPByJzhAfD7MjzlR7BvVsqYrJc7f752/HnK2:xQ1DZ0z0MjHNvGqWJcB
Static task
static1
Behavioral task
behavioral1
Sample
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
yellowbag.top:80
Targets
-
-
Target
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53
-
Size
1.1MB
-
MD5
4b0f5b53264c56125bd5c889e063bbca
-
SHA1
af67f0e3380e79157505e9372922e372ca28fdeb
-
SHA256
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53
-
SHA512
39ac9635eda068f758ff2ece2997100e9cabb254c02e4abb374b99fa415554369273a957ef51209fd0df624db1792bbb30a7f7da96015a7e98df73d290dae0ac
-
SSDEEP
24576:xQYmBqkDPByJzhAfD7MjzlR7BvVsqYrJc7f752/HnK2:xQ1DZ0z0MjHNvGqWJcB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Deobfuscate/Decode Files or Information
1Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1