General
-
Target
656301eac2f3431b400f5b221de7691e95c799e473abf3497fda2b1b1fde752c
-
Size
765KB
-
Sample
230212-d6w1psdg92
-
MD5
9d7b85cbfbfbb59d095cffa148f42742
-
SHA1
f7020942f6b81549abcf8ee87b1618d7fb56e2bc
-
SHA256
656301eac2f3431b400f5b221de7691e95c799e473abf3497fda2b1b1fde752c
-
SHA512
c0c31d79b8e489a51997bac0b4ecfbcc0aeba796c99e8cceca22578f85ac471c46f24407d1fe2941f1801b89225558e353ec25f4341dc37bcfdb8641ca0c4aef
-
SSDEEP
12288:WMrFy90uBVphYYRllwZJZy0dCqNuRkWxq9N5r6mWNOS7GmLi4U1u8:jyjhRlmfZyKQkEWWr6m1U1u8
Static task
static1
Behavioral task
behavioral1
Sample
656301eac2f3431b400f5b221de7691e95c799e473abf3497fda2b1b1fde752c.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Targets
-
-
Target
656301eac2f3431b400f5b221de7691e95c799e473abf3497fda2b1b1fde752c
-
Size
765KB
-
MD5
9d7b85cbfbfbb59d095cffa148f42742
-
SHA1
f7020942f6b81549abcf8ee87b1618d7fb56e2bc
-
SHA256
656301eac2f3431b400f5b221de7691e95c799e473abf3497fda2b1b1fde752c
-
SHA512
c0c31d79b8e489a51997bac0b4ecfbcc0aeba796c99e8cceca22578f85ac471c46f24407d1fe2941f1801b89225558e353ec25f4341dc37bcfdb8641ca0c4aef
-
SSDEEP
12288:WMrFy90uBVphYYRllwZJZy0dCqNuRkWxq9N5r6mWNOS7GmLi4U1u8:jyjhRlmfZyKQkEWWr6m1U1u8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-