General
-
Target
1e2802760f0b07c1290456694ebf5423.exe
-
Size
173KB
-
Sample
221121-mvcmcsah81
-
MD5
1e2802760f0b07c1290456694ebf5423
-
SHA1
9a3a72436ac7d49aeedad5b4eae74173cd8dcb41
-
SHA256
160625fc9d9070b64847cad9582f16da0ddc6ed074ae3d07ec33e9ea4e28e1c2
-
SHA512
197882aa57c2dba7a827f3d0b04428c9d31c09a184b51a0f4dac9a6d47e6127a02fec195d2ac96d72bd8726917e360c985ea698c55e5b45b065f6b8dd0e19b0f
-
SSDEEP
3072:7TQnFeJSrE+G7HRT+rnnDdSzOXueSX5xU5vcOdJRY8pvNBGxEYTlzCS/u:75MrER4nnhyOXs5xETdJRY8ZNBGnXu
Behavioral task
behavioral1
Sample
1e2802760f0b07c1290456694ebf5423.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1e2802760f0b07c1290456694ebf5423.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
@moriwWs
tininshassama.xyz:81
-
auth_value
c2f987b4e6cd55ad1315311e92563eca
Extracted
redline
62.204.41.141:24758
-
auth_value
bde556419603fef0058cbd9e9dcab2a2
Targets
-
-
Target
1e2802760f0b07c1290456694ebf5423.exe
-
Size
173KB
-
MD5
1e2802760f0b07c1290456694ebf5423
-
SHA1
9a3a72436ac7d49aeedad5b4eae74173cd8dcb41
-
SHA256
160625fc9d9070b64847cad9582f16da0ddc6ed074ae3d07ec33e9ea4e28e1c2
-
SHA512
197882aa57c2dba7a827f3d0b04428c9d31c09a184b51a0f4dac9a6d47e6127a02fec195d2ac96d72bd8726917e360c985ea698c55e5b45b065f6b8dd0e19b0f
-
SSDEEP
3072:7TQnFeJSrE+G7HRT+rnnDdSzOXueSX5xU5vcOdJRY8pvNBGxEYTlzCS/u:75MrER4nnhyOXs5xETdJRY8ZNBGnXu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-