General
-
Target
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe
-
Size
1.1MB
-
Sample
240924-b6jz2awbre
-
MD5
6c9e7815208530b2574368f8a70e5790
-
SHA1
61d5d998abbbfe9c6efd9d38b8c99a3b48f8a7de
-
SHA256
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782
-
SHA512
013b6ce1104d05cdd4587197c4e177ef13409db9c81084551450674833d3876a050035a4545a647a257538a2cb44aafaada534c9bfe8e2b5bcf6a9f2dcff134d
-
SSDEEP
12288:o6MAg23QY02Vmv+TmTT8GlTiWqRZ6KTNnGP+l9+dMR4WrEXpPRTt+WHI9D1shsoY:oKsnZZvqmUNssUdHH5TI/DE/ScisNE
Static task
static1
Behavioral task
behavioral1
Sample
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
@LOGSCLOUDYT_BOT
65.21.18.51:45580
Targets
-
-
Target
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe
-
Size
1.1MB
-
MD5
6c9e7815208530b2574368f8a70e5790
-
SHA1
61d5d998abbbfe9c6efd9d38b8c99a3b48f8a7de
-
SHA256
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782
-
SHA512
013b6ce1104d05cdd4587197c4e177ef13409db9c81084551450674833d3876a050035a4545a647a257538a2cb44aafaada534c9bfe8e2b5bcf6a9f2dcff134d
-
SSDEEP
12288:o6MAg23QY02Vmv+TmTT8GlTiWqRZ6KTNnGP+l9+dMR4WrEXpPRTt+WHI9D1shsoY:oKsnZZvqmUNssUdHH5TI/DE/ScisNE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2