General
-
Target
file.exe
-
Size
513KB
-
Sample
230203-lr7gwshd2x
-
MD5
e02ce43db8c035eef98028ed2de1bf5b
-
SHA1
ff92d7955dca85e3f76f93cfa843df34143a27ed
-
SHA256
13fbe02b5bda307ba2ea7f12de31966d5d93ced9c2e9755d05a44902231f8f2c
-
SHA512
0b26ce4b5fecfc6f2384dbebfd7798e10656537b4de77b43b20a05b69f8f59ef66307a502f853b82d64476d1b287dd08eeee66fe9d0ae9b1100ea027dcf362d6
-
SSDEEP
12288:WHZ7vafTCOu7ToGYkCo1z+7k6MjGUnqaSD+CnGt38+dRhq/F:W5mfG6kCocY6a6i3NRhq/
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
redko
62.204.41.170:4179
-
auth_value
9bcf7b0620ff067017d66b9a5d80b547
Extracted
amadey
3.66
193.233.20.2/Bn89hku/index.php
Extracted
redline
mixo
176.113.115.16:4122
-
auth_value
f8c6749529d254a59e80682dd4ba63f6
Extracted
redline
gonka
62.204.41.170:4179
-
auth_value
f017b1096da5cc257f8ca109051c5fbb
Extracted
redline
temposs6678
82.115.223.9:15486
-
auth_value
af399e6a2fe66f67025541cf71c64313
Targets
-
-
Target
file.exe
-
Size
513KB
-
MD5
e02ce43db8c035eef98028ed2de1bf5b
-
SHA1
ff92d7955dca85e3f76f93cfa843df34143a27ed
-
SHA256
13fbe02b5bda307ba2ea7f12de31966d5d93ced9c2e9755d05a44902231f8f2c
-
SHA512
0b26ce4b5fecfc6f2384dbebfd7798e10656537b4de77b43b20a05b69f8f59ef66307a502f853b82d64476d1b287dd08eeee66fe9d0ae9b1100ea027dcf362d6
-
SSDEEP
12288:WHZ7vafTCOu7ToGYkCo1z+7k6MjGUnqaSD+CnGt38+dRhq/F:W5mfG6kCocY6a6i3NRhq/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-