General
-
Target
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640
-
Size
566KB
-
Sample
230503-2rvfbsah3w
-
MD5
a2a4adc80226fad0d60301c6c3ecdd6f
-
SHA1
d55457fc76b11412e540ef26379698e59c93540c
-
SHA256
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640
-
SHA512
b445f35473b6579aab5b4d741374b8eb40b94580ae5c01d796186a6c071ae064ae452852b885ca972ab54ea2bacf4e4ac334629128af872766d33b6a38d3498d
-
SSDEEP
12288:uMrHy90UUGqhHoK+r9qnk4fDq0VkG/owKoc:hyXZmoK+g1q0VksowK3
Static task
static1
Behavioral task
behavioral1
Sample
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Targets
-
-
Target
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640
-
Size
566KB
-
MD5
a2a4adc80226fad0d60301c6c3ecdd6f
-
SHA1
d55457fc76b11412e540ef26379698e59c93540c
-
SHA256
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640
-
SHA512
b445f35473b6579aab5b4d741374b8eb40b94580ae5c01d796186a6c071ae064ae452852b885ca972ab54ea2bacf4e4ac334629128af872766d33b6a38d3498d
-
SSDEEP
12288:uMrHy90UUGqhHoK+r9qnk4fDq0VkG/owKoc:hyXZmoK+g1q0VksowK3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-