General
-
Target
d81d3abfa3fbbe02637a80f89f24bf0596de73fc1e678403ba3e1eff1007d814.bin
-
Size
1.5MB
-
Sample
230501-xbd17afc2t
-
MD5
a3b6fb74cc299398025ff4ab299ded2a
-
SHA1
82bd61d6a4a6758b62536eda6f2576b88cecd291
-
SHA256
d81d3abfa3fbbe02637a80f89f24bf0596de73fc1e678403ba3e1eff1007d814
-
SHA512
fd984de5088d36d333a992b173f7c603b3eb3157d18711be8eb209a644e7d39e7e9213e577e17d152c021a7ad7a2ede09736fc3bfec76bf56e1d130ab06dbcd5
-
SSDEEP
24576:/yAsm2jWos0LjtlnqblToUZjj9lD5LfTZFHpV43Bqyqq7hjZ3z0DNr:KAs7WV0nttqblToADD5LfTZ14XqybU
Static task
static1
Behavioral task
behavioral1
Sample
d81d3abfa3fbbe02637a80f89f24bf0596de73fc1e678403ba3e1eff1007d814.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d81d3abfa3fbbe02637a80f89f24bf0596de73fc1e678403ba3e1eff1007d814.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Targets
-
-
Target
d81d3abfa3fbbe02637a80f89f24bf0596de73fc1e678403ba3e1eff1007d814.bin
-
Size
1.5MB
-
MD5
a3b6fb74cc299398025ff4ab299ded2a
-
SHA1
82bd61d6a4a6758b62536eda6f2576b88cecd291
-
SHA256
d81d3abfa3fbbe02637a80f89f24bf0596de73fc1e678403ba3e1eff1007d814
-
SHA512
fd984de5088d36d333a992b173f7c603b3eb3157d18711be8eb209a644e7d39e7e9213e577e17d152c021a7ad7a2ede09736fc3bfec76bf56e1d130ab06dbcd5
-
SSDEEP
24576:/yAsm2jWos0LjtlnqblToUZjj9lD5LfTZFHpV43Bqyqq7hjZ3z0DNr:KAs7WV0nttqblToADD5LfTZ14XqybU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-