General
-
Target
8ac294da2b5fed0f7d472c1085839526e554f0fcb61dee906db7d3a7e614274aN.exe
-
Size
6KB
-
Sample
241202-k1jxhsykg1
-
MD5
699f560ef94b40660358d8266df4ece0
-
SHA1
91c9c7c8081f3744482e1c91e461b9801dd9fb8c
-
SHA256
8ac294da2b5fed0f7d472c1085839526e554f0fcb61dee906db7d3a7e614274a
-
SHA512
68f91d686d5aedc506540c925ed83157e88c1527c672350cb42ca959af30d0b7a250138a2297bb7e247cf1bb0b59b119bc0a59406b1c6c13761a2527cb2aa3b1
-
SSDEEP
96:cDD5/TKf21gKbv5z+jLkG5wFDnLj7K9K8OHPl5TzNt:E5/TgSzKLkGWRnH7KTOHt51
Static task
static1
Behavioral task
behavioral1
Sample
8ac294da2b5fed0f7d472c1085839526e554f0fcb61dee906db7d3a7e614274aN.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
41.216.183.218:1912
Targets
-
-
Target
8ac294da2b5fed0f7d472c1085839526e554f0fcb61dee906db7d3a7e614274aN.exe
-
Size
6KB
-
MD5
699f560ef94b40660358d8266df4ece0
-
SHA1
91c9c7c8081f3744482e1c91e461b9801dd9fb8c
-
SHA256
8ac294da2b5fed0f7d472c1085839526e554f0fcb61dee906db7d3a7e614274a
-
SHA512
68f91d686d5aedc506540c925ed83157e88c1527c672350cb42ca959af30d0b7a250138a2297bb7e247cf1bb0b59b119bc0a59406b1c6c13761a2527cb2aa3b1
-
SSDEEP
96:cDD5/TKf21gKbv5z+jLkG5wFDnLj7K9K8OHPl5TzNt:E5/TgSzKLkGWRnH7KTOHt51
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-