General
-
Target
cccdfdc13279aa1be7fa94d2e7969dae050e53d5047af5b9c91eb1f424bf1955
-
Size
758KB
-
Sample
230213-aearlshe53
-
MD5
57d40739d9f042e24d7108c08be2b783
-
SHA1
238ae80b7ba624ae73079b989a5a1ae474c383b1
-
SHA256
cccdfdc13279aa1be7fa94d2e7969dae050e53d5047af5b9c91eb1f424bf1955
-
SHA512
9c112d8182fb75128f6eaa4f396786878730726796a918c980b0e5b57e7086123ac2d58a461e08c4b9f4910805fc6fc07e74583653aaaad3979dd8acf81293bf
-
SSDEEP
12288:VMrey90FWr1pVlbtqNnuLHivMm23inLqsEvnUm4GctlCAXXcm7MpWAgr:Ty7r3VlJqNnuLqj2CxuUzvlVXH7MpOr
Static task
static1
Behavioral task
behavioral1
Sample
cccdfdc13279aa1be7fa94d2e7969dae050e53d5047af5b9c91eb1f424bf1955.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Targets
-
-
Target
cccdfdc13279aa1be7fa94d2e7969dae050e53d5047af5b9c91eb1f424bf1955
-
Size
758KB
-
MD5
57d40739d9f042e24d7108c08be2b783
-
SHA1
238ae80b7ba624ae73079b989a5a1ae474c383b1
-
SHA256
cccdfdc13279aa1be7fa94d2e7969dae050e53d5047af5b9c91eb1f424bf1955
-
SHA512
9c112d8182fb75128f6eaa4f396786878730726796a918c980b0e5b57e7086123ac2d58a461e08c4b9f4910805fc6fc07e74583653aaaad3979dd8acf81293bf
-
SSDEEP
12288:VMrey90FWr1pVlbtqNnuLHivMm23inLqsEvnUm4GctlCAXXcm7MpWAgr:Ty7r3VlJqNnuLqj2CxuUzvlVXH7MpOr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-