General
-
Target
file.exe
-
Size
301KB
-
Sample
221014-qh1efaded6
-
MD5
fdbdc3ebe7e613be4242099892cb2b6b
-
SHA1
2abfdd0c1000d25e06d94e77a5c58de26b52c43a
-
SHA256
f1a912751f4de1f7f0a4ad4a3c721112082877ef3d342968da6ae53449744ae1
-
SHA512
9f20e5de8a8442ad44a48003122d88df727c845465924220e50a10b34f6e3977d8e76172ad58489f7112aa650637ed64730fb3f978388e5cca27e39d1d1227f6
-
SSDEEP
96:ZbtyE1vwPEl8JQO2a4ox1DjUXgB6NgoWDPY3/brRK0r2YE7KWfgRPbbFnU:Z9vsElzON4CUXgatWDPYTdK0GuWfgJy
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
Morn
80.66.87.20:80
-
auth_value
98b8a59d3016c72d785854c61b951f1a
Targets
-
-
Target
file.exe
-
Size
301KB
-
MD5
fdbdc3ebe7e613be4242099892cb2b6b
-
SHA1
2abfdd0c1000d25e06d94e77a5c58de26b52c43a
-
SHA256
f1a912751f4de1f7f0a4ad4a3c721112082877ef3d342968da6ae53449744ae1
-
SHA512
9f20e5de8a8442ad44a48003122d88df727c845465924220e50a10b34f6e3977d8e76172ad58489f7112aa650637ed64730fb3f978388e5cca27e39d1d1227f6
-
SSDEEP
96:ZbtyE1vwPEl8JQO2a4ox1DjUXgB6NgoWDPY3/brRK0r2YE7KWfgRPbbFnU:Z9vsElzON4CUXgatWDPYTdK0GuWfgJy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-