General
-
Target
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
-
Size
233KB
-
Sample
220412-jlf2mscae3
-
MD5
a9d9617466a30b874b80d4fd6465f46b
-
SHA1
b6e42e3a1fbc20c78e003b065440733fb1cafe84
-
SHA256
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
-
SHA512
ec3d90e3c7b9427ecb9097941a37872c195cc389bf45a78b7c343d7d964fcf999266cee8bea78907cb302d318b74035948b7db760903692e4275d5016d3e1c89
Static task
static1
Behavioral task
behavioral1
Sample
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
redline
123
188.68.205.12:7053
-
auth_value
cba3087b3c1a6a9c43b3f96591452ea2
Targets
-
-
Target
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
-
Size
233KB
-
MD5
a9d9617466a30b874b80d4fd6465f46b
-
SHA1
b6e42e3a1fbc20c78e003b065440733fb1cafe84
-
SHA256
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
-
SHA512
ec3d90e3c7b9427ecb9097941a37872c195cc389bf45a78b7c343d7d964fcf999266cee8bea78907cb302d318b74035948b7db760903692e4275d5016d3e1c89
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
LoaderBot executable
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-