General
-
Target
Payment_Advice_HSBC_Swift_Copy.pdf.lnk
-
Size
3KB
-
Sample
241129-k5la5sxkd1
-
MD5
b34d7dcf2fd1a08025934b2b3b60c4d3
-
SHA1
2d892b1de088baed8ae4df89536b7e197ea7d83e
-
SHA256
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387
-
SHA512
03bcf8eb554b5fcab7f843f3841c20a2a008d3dbdc5904577935122ff2c1fd86c975d9aaec6faaf9ed36354af663deaba39901fe4da700c74e8c4cead605cacd
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice_HSBC_Swift_Copy.pdf.lnk
Resource
win7-20241023-en
Malware Config
Extracted
redline
cheat
41.216.183.218:1912
Targets
-
-
Target
Payment_Advice_HSBC_Swift_Copy.pdf.lnk
-
Size
3KB
-
MD5
b34d7dcf2fd1a08025934b2b3b60c4d3
-
SHA1
2d892b1de088baed8ae4df89536b7e197ea7d83e
-
SHA256
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387
-
SHA512
03bcf8eb554b5fcab7f843f3841c20a2a008d3dbdc5904577935122ff2c1fd86c975d9aaec6faaf9ed36354af663deaba39901fe4da700c74e8c4cead605cacd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-