General
-
Target
bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106
-
Size
492KB
-
Sample
240921-h1wvzazhqc
-
MD5
ae1564b5c50d10489518f1dfe81db85c
-
SHA1
117daeac12c9c04798bd2914d7645de16a447ab3
-
SHA256
bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106
-
SHA512
c1df3b3240633b9424d11dfd9b4cbf54e83d9f22e3e42d2d8aa035b5da7e792c95c661a016889993d5e3312920e5fd9f12f87c083719e83e8dce3725893597fd
-
SSDEEP
12288:DDMzpnp7b3b3P9PNx2kSof0Dzqvc9KO1K+yPUt7eBodW0ByN7REKm9TsN4RR+HA:/MzBp77b3P9Fvf0
Static task
static1
Behavioral task
behavioral1
Sample
bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
185.196.9.26:6302
Targets
-
-
Target
bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106
-
Size
492KB
-
MD5
ae1564b5c50d10489518f1dfe81db85c
-
SHA1
117daeac12c9c04798bd2914d7645de16a447ab3
-
SHA256
bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106
-
SHA512
c1df3b3240633b9424d11dfd9b4cbf54e83d9f22e3e42d2d8aa035b5da7e792c95c661a016889993d5e3312920e5fd9f12f87c083719e83e8dce3725893597fd
-
SSDEEP
12288:DDMzpnp7b3b3P9PNx2kSof0Dzqvc9KO1K+yPUt7eBodW0ByN7REKm9TsN4RR+HA:/MzBp77b3P9Fvf0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-