General
-
Target
d93c0b50907c1cd8a9a3b704f674e76c870065b4246c468ed1a627272a82bc25
-
Size
758KB
-
Sample
230213-ga5vhsbb67
-
MD5
d5872977075fa6037b285f35c8c1a35d
-
SHA1
0f61aff4b4217eb0a87d2b6fbc66c597ae8429dd
-
SHA256
d93c0b50907c1cd8a9a3b704f674e76c870065b4246c468ed1a627272a82bc25
-
SHA512
c03b0bce217afc718c1349f59b5d491782cbe219857a2ce038c97fecfba7bbdbb8c7c4d9cb83e29463f37772ae09b85c67916b9dc11b12fa8b8052475c2503e3
-
SSDEEP
12288:bMrzy90pzluV6QPue/oyf6a4USaDnBhtnrl83U9ye530sUcRKMdiMbOt/L:kyaMV6PrLFqn/tn23UTh0qrd5eD
Static task
static1
Behavioral task
behavioral1
Sample
d93c0b50907c1cd8a9a3b704f674e76c870065b4246c468ed1a627272a82bc25.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Targets
-
-
Target
d93c0b50907c1cd8a9a3b704f674e76c870065b4246c468ed1a627272a82bc25
-
Size
758KB
-
MD5
d5872977075fa6037b285f35c8c1a35d
-
SHA1
0f61aff4b4217eb0a87d2b6fbc66c597ae8429dd
-
SHA256
d93c0b50907c1cd8a9a3b704f674e76c870065b4246c468ed1a627272a82bc25
-
SHA512
c03b0bce217afc718c1349f59b5d491782cbe219857a2ce038c97fecfba7bbdbb8c7c4d9cb83e29463f37772ae09b85c67916b9dc11b12fa8b8052475c2503e3
-
SSDEEP
12288:bMrzy90pzluV6QPue/oyf6a4USaDnBhtnrl83U9ye530sUcRKMdiMbOt/L:kyaMV6PrLFqn/tn23UTh0qrd5eD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-