General
-
Target
a35d7021023d811fad337c9c42f49837.exe
-
Size
740KB
-
Sample
230214-ycdx9afb6x
-
MD5
a35d7021023d811fad337c9c42f49837
-
SHA1
e1d6a58dc61ea3edd658d5c0d49300b6739a04e4
-
SHA256
e9d1df7bf986c1e6ea28266c075b19598edcd6c3d20e0d57968f27263d2edb3a
-
SHA512
2a5f35e73ecd17fd37a52d61d2429fd7c4dc83f5a1175c83fedd7eb0be80822ffaec61631531a643dc9c7c5576efe4ef0e1ae93211f0eec5c25fd1777ce8db48
-
SSDEEP
12288:5Mrgy90FPx6i7cF7EMtDhkG7d3EP4DbVd3+uR3T6lXoX5rv3QrcGA1IBQTj5R8nE:FysQi7PMtlkGR0gDJ134XoX5TAKIBQBd
Static task
static1
Behavioral task
behavioral1
Sample
a35d7021023d811fad337c9c42f49837.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a35d7021023d811fad337c9c42f49837.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
cr10
176.113.115.17:4132
-
auth_value
0a52a09c70a98bb6612362e5eb8b1d02
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
a35d7021023d811fad337c9c42f49837.exe
-
Size
740KB
-
MD5
a35d7021023d811fad337c9c42f49837
-
SHA1
e1d6a58dc61ea3edd658d5c0d49300b6739a04e4
-
SHA256
e9d1df7bf986c1e6ea28266c075b19598edcd6c3d20e0d57968f27263d2edb3a
-
SHA512
2a5f35e73ecd17fd37a52d61d2429fd7c4dc83f5a1175c83fedd7eb0be80822ffaec61631531a643dc9c7c5576efe4ef0e1ae93211f0eec5c25fd1777ce8db48
-
SSDEEP
12288:5Mrgy90FPx6i7cF7EMtDhkG7d3EP4DbVd3+uR3T6lXoX5rv3QrcGA1IBQTj5R8nE:FysQi7PMtlkGR0gDJ134XoX5TAKIBQBd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-