General
-
Target
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a
-
Size
566KB
-
Sample
230503-2es2qsag6z
-
MD5
4e1bacfcd84705b4cf20a1f794ee5145
-
SHA1
f8a78002722c75fdef79a1ee0f025d972d2ad37f
-
SHA256
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a
-
SHA512
7c81c0963a08c99ff473ea2fa3c979bd669cdbdf7f1614ea0412a57bbef300a22e059f59fa34b48b317470e0d65f2e7bdef6cf74b8ef822aa01cc88207656fa6
-
SSDEEP
12288:9Mrky90yN/7lIQwgCKug+HOybVYBYl6yACz5zE6/w+:py1rQuL26PC6S
Static task
static1
Behavioral task
behavioral1
Sample
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Targets
-
-
Target
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a
-
Size
566KB
-
MD5
4e1bacfcd84705b4cf20a1f794ee5145
-
SHA1
f8a78002722c75fdef79a1ee0f025d972d2ad37f
-
SHA256
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a
-
SHA512
7c81c0963a08c99ff473ea2fa3c979bd669cdbdf7f1614ea0412a57bbef300a22e059f59fa34b48b317470e0d65f2e7bdef6cf74b8ef822aa01cc88207656fa6
-
SSDEEP
12288:9Mrky90yN/7lIQwgCKug+HOybVYBYl6yACz5zE6/w+:py1rQuL26PC6S
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-