General
-
Target
5b4a4a9cd9143cff6919035b25fb90aa1f077d7ebc10e89272ea172bb8fcdb68
-
Size
761KB
-
Sample
230212-l3ydcscf85
-
MD5
9a450c5a1668623a79caac0001be909f
-
SHA1
8145f3dc14855223f5ed5df87d46a2b796e5aa80
-
SHA256
5b4a4a9cd9143cff6919035b25fb90aa1f077d7ebc10e89272ea172bb8fcdb68
-
SHA512
3769560ca032cbb3011cf7ffc964759a76fdddd8a3802d6143012e82c051b9c40112642e970cd7ab6173cfdbe377e793db2b43ffb47651778bc605d4671a6184
-
SSDEEP
12288:cMrqy90uuCno4IGfek1q9fOXYX6PpzGaTX8uhgl1l8FFRGGU+5XIaGtARYvBGblc:2ynK4DR1q9ftMpzG8nylT8GGUSIadYvH
Static task
static1
Behavioral task
behavioral1
Sample
5b4a4a9cd9143cff6919035b25fb90aa1f077d7ebc10e89272ea172bb8fcdb68.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Targets
-
-
Target
5b4a4a9cd9143cff6919035b25fb90aa1f077d7ebc10e89272ea172bb8fcdb68
-
Size
761KB
-
MD5
9a450c5a1668623a79caac0001be909f
-
SHA1
8145f3dc14855223f5ed5df87d46a2b796e5aa80
-
SHA256
5b4a4a9cd9143cff6919035b25fb90aa1f077d7ebc10e89272ea172bb8fcdb68
-
SHA512
3769560ca032cbb3011cf7ffc964759a76fdddd8a3802d6143012e82c051b9c40112642e970cd7ab6173cfdbe377e793db2b43ffb47651778bc605d4671a6184
-
SSDEEP
12288:cMrqy90uuCno4IGfek1q9fOXYX6PpzGaTX8uhgl1l8FFRGGU+5XIaGtARYvBGblc:2ynK4DR1q9ftMpzG8nylT8GGUSIadYvH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-