General
-
Target
cb6868475e1cbfc57a9dbc3dab3bc725e91fe0e942e457f63085ce21b87a3942
-
Size
674KB
-
Sample
221201-nzv5yahb7s
-
MD5
41335f83156230e62b02ea6831eb6351
-
SHA1
b88b3b41e61c8633316b36bac395bd9d5cdec0cf
-
SHA256
cb6868475e1cbfc57a9dbc3dab3bc725e91fe0e942e457f63085ce21b87a3942
-
SHA512
cec006fe36d20970c97d90116c8a3f375c1b37bfdec45f052c739d9f19bc9c2838aa2df4b71b38f288d089b6d4eeeda3f3e5e0e9b34f0bb102666adb2da8c9ca
-
SSDEEP
12288:FWCLQIClF5mkXWP3dFwCy6ZnPzmPQuwB6:HQIAFQkXWP3jhLmPl06
Static task
static1
Behavioral task
behavioral1
Sample
cb6868475e1cbfc57a9dbc3dab3bc725e91fe0e942e457f63085ce21b87a3942.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
2811
81.161.229.143:26910
-
auth_value
ef69aa35b72be83a278c5107422c9e4e
Targets
-
-
Target
cb6868475e1cbfc57a9dbc3dab3bc725e91fe0e942e457f63085ce21b87a3942
-
Size
674KB
-
MD5
41335f83156230e62b02ea6831eb6351
-
SHA1
b88b3b41e61c8633316b36bac395bd9d5cdec0cf
-
SHA256
cb6868475e1cbfc57a9dbc3dab3bc725e91fe0e942e457f63085ce21b87a3942
-
SHA512
cec006fe36d20970c97d90116c8a3f375c1b37bfdec45f052c739d9f19bc9c2838aa2df4b71b38f288d089b6d4eeeda3f3e5e0e9b34f0bb102666adb2da8c9ca
-
SSDEEP
12288:FWCLQIClF5mkXWP3dFwCy6ZnPzmPQuwB6:HQIAFQkXWP3jhLmPl06
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Async RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-