General
-
Target
9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
-
Size
2.3MB
-
Sample
230329-faxcpsgd41
-
MD5
8f3e8fa1ba9c4c10680a9135a2ab6724
-
SHA1
40786bac389dcd6b175f9973b81e706cdb9806cf
-
SHA256
9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
-
SHA512
851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836
-
SSDEEP
24576:7NLUDs+Be2DXO8Xl0a5qMKtu1Dze6HDpLrb296zoB1GqHesQkKOR+kUJMaosMQbm:7ZgrRrO8Xl0ME1il6QgaZRHdlB
Static task
static1
Behavioral task
behavioral1
Sample
9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
@DridexxSupport
188.212.124.133:16312
-
auth_value
e5a22ab56ec9b2f984d6e4504915843a
Targets
-
-
Target
9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
-
Size
2.3MB
-
MD5
8f3e8fa1ba9c4c10680a9135a2ab6724
-
SHA1
40786bac389dcd6b175f9973b81e706cdb9806cf
-
SHA256
9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
-
SHA512
851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836
-
SSDEEP
24576:7NLUDs+Be2DXO8Xl0a5qMKtu1Dze6HDpLrb296zoB1GqHesQkKOR+kUJMaosMQbm:7ZgrRrO8Xl0ME1il6QgaZRHdlB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-