General
-
Target
9939313dcf328250ea676d66a4f58b3663dc717f3f985f5586acf74fd5a3e850
-
Size
770KB
-
Sample
230213-ncl9hscg87
-
MD5
b531693a4a0d28cb5f7a0775faa44968
-
SHA1
d44a59462bb7b7ab3c305c434470e89ba43db5b8
-
SHA256
9939313dcf328250ea676d66a4f58b3663dc717f3f985f5586acf74fd5a3e850
-
SHA512
64dbf57dd517f47363e8c3533fe067f63e255a7b0ca79c8eaac5cf8e5ef9499163936fe13b6344ef54eff121bc85e1c9a0020e77d4d3e4be37f42ec73a211528
-
SSDEEP
24576:ry6SogXSeIfsv/b5hIb2i1q/mVDdO1OKg+Y5:e6SogieSy/b5Li1Um7OZY
Static task
static1
Behavioral task
behavioral1
Sample
9939313dcf328250ea676d66a4f58b3663dc717f3f985f5586acf74fd5a3e850.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Targets
-
-
Target
9939313dcf328250ea676d66a4f58b3663dc717f3f985f5586acf74fd5a3e850
-
Size
770KB
-
MD5
b531693a4a0d28cb5f7a0775faa44968
-
SHA1
d44a59462bb7b7ab3c305c434470e89ba43db5b8
-
SHA256
9939313dcf328250ea676d66a4f58b3663dc717f3f985f5586acf74fd5a3e850
-
SHA512
64dbf57dd517f47363e8c3533fe067f63e255a7b0ca79c8eaac5cf8e5ef9499163936fe13b6344ef54eff121bc85e1c9a0020e77d4d3e4be37f42ec73a211528
-
SSDEEP
24576:ry6SogXSeIfsv/b5hIb2i1q/mVDdO1OKg+Y5:e6SogieSy/b5Li1Um7OZY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-