General
-
Target
d9f6bfffe255763244f7b63d647f2869.exe
-
Size
2.6MB
-
Sample
230421-swbz4sgc96
-
MD5
d9f6bfffe255763244f7b63d647f2869
-
SHA1
8e08e061cb03b7e115cb95a7f5d90ab15634543f
-
SHA256
785cb3b54431b3263c31575eba2105a639acc717ed7224e16765311bd7d44fdc
-
SHA512
d1fe50c73bba0d7dc0298967e000bbbec62c25df54633c413f4070e5b53eed2c91b9d37a5d06e47b6b5b704b7119272e63cb26d4fd0176a4ba54f25c61a1adbc
-
SSDEEP
49152:IBJM6kjimTyXgmuzIkqg+5oRI+wUa96VLnMo/xajfsPU:y+6fmTyXgVUNoaUa96N/xY
Static task
static1
Behavioral task
behavioral1
Sample
d9f6bfffe255763244f7b63d647f2869.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d9f6bfffe255763244f7b63d647f2869.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Targets
-
-
Target
d9f6bfffe255763244f7b63d647f2869.exe
-
Size
2.6MB
-
MD5
d9f6bfffe255763244f7b63d647f2869
-
SHA1
8e08e061cb03b7e115cb95a7f5d90ab15634543f
-
SHA256
785cb3b54431b3263c31575eba2105a639acc717ed7224e16765311bd7d44fdc
-
SHA512
d1fe50c73bba0d7dc0298967e000bbbec62c25df54633c413f4070e5b53eed2c91b9d37a5d06e47b6b5b704b7119272e63cb26d4fd0176a4ba54f25c61a1adbc
-
SSDEEP
49152:IBJM6kjimTyXgmuzIkqg+5oRI+wUa96VLnMo/xajfsPU:y+6fmTyXgVUNoaUa96N/xY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-