General
-
Target
607c8e5c6b50f2e6ddc15bac7d48c57a81db1b893fd5ecd8d112c73cd1dc5a52.zip
-
Size
6.3MB
-
Sample
230329-s52bcsae31
-
MD5
7bb2082bff15378f53b9abe6a6bc75b5
-
SHA1
4db2cd8ea2d98cdcfd6677b22f53aa719f51c38f
-
SHA256
069ca2e2865e37a2e0e15b701b8cb64a8833ad16e38f2a6b6f7b4025451d1205
-
SHA512
6a8a78432008c33c91bd4c66c8b05e620561cdee180d6007ef734408c9da53bff0fb8849630d16509a1110b5ffed1b8b0391ea19271efc7fa9589ef4e63bae26
-
SSDEEP
98304:K9f2/aY5GpkSXfsWaMp1dsc+TvbwvpqUel+JQjBvdZ6uG0do5q2lxRCbqka2:K9/pk8fpakdLmsv/MVCuG2uquw/
Behavioral task
behavioral1
Sample
607c8e5c6b50f2e6ddc15bac7d48c57a81db1b893fd5ecd8d112c73cd1dc5a52.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
DARKWEB
89.22.234.180:40608
-
auth_value
cf407bc0c9a8384bb62aa110b7844cfe
Targets
-
-
Target
607c8e5c6b50f2e6ddc15bac7d48c57a81db1b893fd5ecd8d112c73cd1dc5a52
-
Size
7.2MB
-
MD5
c0897e921672c2619acc5d9ff1329860
-
SHA1
683d5c1b0858cd5089e4a60ba344872531584d35
-
SHA256
607c8e5c6b50f2e6ddc15bac7d48c57a81db1b893fd5ecd8d112c73cd1dc5a52
-
SHA512
696ce43462167d474491fc8dee8cd29ef8d12a1795d6b4e5262332fa58b102a503f5565799f960237b8fa58796391f445856206d70b4b8087f9918399063d4ff
-
SSDEEP
196608:FLQ6B/XKUDz9NoUXJzUWi7MYjBVvo5/UVC:ZFlaU/9NZXJZinjB9oxgC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-