General
-
Target
file.exe
-
Size
383KB
-
Sample
221122-kkac5sba6w
-
MD5
58e19e4ecbfc9e2f32e2a300635bd82d
-
SHA1
58d58d5b242d1cb1df7fa761df6eaf127b71719f
-
SHA256
f36a8b642ad4cbf276e83861df2328926ec3f899794036e30736e63a9d078185
-
SHA512
a262de9767d891b586ffd9a95080c9fc87fab44b923b1adad6e6dc94a7eecd1c57c0feca2dc00150f5f4aac3049c8d0e9a46ed778e9747b518d72b96703372c0
-
SSDEEP
6144:hLrW6JxFI46YeEIDgIs8wx9nVVFpIVSPapjQWVwv8TJH:JW6nEI8wx95OVSPCQW2MJ
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
top1
chardhesha.xyz:81
jalocliche.xyz:81
-
auth_value
fa2afa98a6579319e36e31ee0552bd57
Extracted
redline
Lyla.22.11
185.215.113.216:21921
-
auth_value
4e1560b379e71c6ab6ae277b9d4c6895
Targets
-
-
Target
file.exe
-
Size
383KB
-
MD5
58e19e4ecbfc9e2f32e2a300635bd82d
-
SHA1
58d58d5b242d1cb1df7fa761df6eaf127b71719f
-
SHA256
f36a8b642ad4cbf276e83861df2328926ec3f899794036e30736e63a9d078185
-
SHA512
a262de9767d891b586ffd9a95080c9fc87fab44b923b1adad6e6dc94a7eecd1c57c0feca2dc00150f5f4aac3049c8d0e9a46ed778e9747b518d72b96703372c0
-
SSDEEP
6144:hLrW6JxFI46YeEIDgIs8wx9nVVFpIVSPapjQWVwv8TJH:JW6nEI8wx95OVSPCQW2MJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detectes Phoenix Miner Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-