General
-
Target
UltraViolince.exe
-
Size
388KB
-
Sample
240919-fxhg3asgjr
-
MD5
eed18b5e8e965f41241e3bbd9364c101
-
SHA1
ab91d2db2b030049c8df0a17f60930ccff2e1ea4
-
SHA256
1dd30d7863a6687e4810a4f8da7e6aae7c12c6633df0517872682fbdfb951d7c
-
SHA512
2a6e429e2f3c218a330912483f91f67c4c6641644129c8a7a19e3f14f6d988854c2df1833af04dd95bd784fa1b0f217255e1abdc54d57bc2fedd136c0fef0b81
-
SSDEEP
12288:Fjy9qoZEQc2vKIkOMKTpQMCpkTNk9S4wYU7JKS3Jpx:Fjy9DBaI2mvIkT
Static task
static1
Behavioral task
behavioral1
Sample
UltraViolince.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
UltraViolince.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
185.196.9.26:6302
Targets
-
-
Target
UltraViolince.exe
-
Size
388KB
-
MD5
eed18b5e8e965f41241e3bbd9364c101
-
SHA1
ab91d2db2b030049c8df0a17f60930ccff2e1ea4
-
SHA256
1dd30d7863a6687e4810a4f8da7e6aae7c12c6633df0517872682fbdfb951d7c
-
SHA512
2a6e429e2f3c218a330912483f91f67c4c6641644129c8a7a19e3f14f6d988854c2df1833af04dd95bd784fa1b0f217255e1abdc54d57bc2fedd136c0fef0b81
-
SSDEEP
12288:Fjy9qoZEQc2vKIkOMKTpQMCpkTNk9S4wYU7JKS3Jpx:Fjy9DBaI2mvIkT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-