General
-
Target
file.exe
-
Size
523KB
-
Sample
220910-sk6ekseaaq
-
MD5
9224e118f4c08d6d1011ca694be9df3b
-
SHA1
87799e7f922e8e0170a37c3c73ec7ca0a8b5ca92
-
SHA256
aadcd7f826198c71e998d31ae4ddd4f219d61ed27338ab7aec0c055749f1bc24
-
SHA512
597197e5d45712a88a8bda971a1f459228203b774b247efa6c1d405c9878b111b02063124e051b9a5f6eec11f5f220bad443917cd122a6da2b7c9d7cd96c6f8a
-
SSDEEP
6144:vK8LfFo13WU+kmGbW8m5Oq3zmzZVhnkidyPaiWaXukbSBykZBItx+:S8LfK+mb25OqdEFywI
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
inst
78.153.144.20:40613
-
auth_value
7c24254e6f334180ca16aeb915f16863
Extracted
redline
81.161.229.143:27938
-
auth_value
6687e352a0604d495c3851d248ebf06f
Targets
-
-
Target
file.exe
-
Size
523KB
-
MD5
9224e118f4c08d6d1011ca694be9df3b
-
SHA1
87799e7f922e8e0170a37c3c73ec7ca0a8b5ca92
-
SHA256
aadcd7f826198c71e998d31ae4ddd4f219d61ed27338ab7aec0c055749f1bc24
-
SHA512
597197e5d45712a88a8bda971a1f459228203b774b247efa6c1d405c9878b111b02063124e051b9a5f6eec11f5f220bad443917cd122a6da2b7c9d7cd96c6f8a
-
SSDEEP
6144:vK8LfFo13WU+kmGbW8m5Oq3zmzZVhnkidyPaiWaXukbSBykZBItx+:S8LfK+mb25OqdEFywI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-