General
-
Target
1538e0f1403136f2f0c101efc81a4d5ebcb2a4908f0080e7db59010b2e81f321
-
Size
556KB
-
Sample
230503-1x4eragg73
-
MD5
d95fc460c637aaf791f4a3873cb8882d
-
SHA1
d44f8c22a201d5969355596c77778f20b267a2c6
-
SHA256
1538e0f1403136f2f0c101efc81a4d5ebcb2a4908f0080e7db59010b2e81f321
-
SHA512
4c79aa428b5df70a3c8a69e6e9c94c0ea40a1bb9e98dddae31193a02706d95551b7a2b3828064303fb47e30b198e1d5d250ae1eac808243aab4a3db2a5a9c607
-
SSDEEP
12288:5Mrcy908BqOV2tS1U9qrKmvWEG1JOmrskTs2jDR:9y/UYQJwuR13gYsUl
Static task
static1
Behavioral task
behavioral1
Sample
1538e0f1403136f2f0c101efc81a4d5ebcb2a4908f0080e7db59010b2e81f321.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Targets
-
-
Target
1538e0f1403136f2f0c101efc81a4d5ebcb2a4908f0080e7db59010b2e81f321
-
Size
556KB
-
MD5
d95fc460c637aaf791f4a3873cb8882d
-
SHA1
d44f8c22a201d5969355596c77778f20b267a2c6
-
SHA256
1538e0f1403136f2f0c101efc81a4d5ebcb2a4908f0080e7db59010b2e81f321
-
SHA512
4c79aa428b5df70a3c8a69e6e9c94c0ea40a1bb9e98dddae31193a02706d95551b7a2b3828064303fb47e30b198e1d5d250ae1eac808243aab4a3db2a5a9c607
-
SSDEEP
12288:5Mrcy908BqOV2tS1U9qrKmvWEG1JOmrskTs2jDR:9y/UYQJwuR13gYsUl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-